منابع مشابه
Deciding Security for a Fragment of ASLan
ASLan is the input language of the verification tools of the AVANTSSAR platform, and an extension of the AVISPA Intermediate Format IF. One of ASLan’s core features over IF is to integrate a transition system with Horn clauses that are evaluated at every state. This allows for modeling many common situations in security such as the interaction between the workflow of a system with its access co...
متن کاملA similarity-based approach for shape classification using Aslan skeletons
Shape skeletons are commonly used in generic shape recognition as they capture part hierarchy, providing a structural representation of shapes. However, their potential for shape classification has not been investigated much. In this study, we present a similarity based approach for classifying 2D shapes based on their Aslan skeletons [1, 2]. The coarse structure of this skeleton representation...
متن کاملASLan++ - A Formal Security Specification Language for Distributed Systems
This paper introduces ASLan++, the AVANTSSAR Specification Language. ASLan++ has been designed for formally specifying dynamically composed security-sensitive web services and serviceoriented architectures, their associated security policies, as well as their security properties, at both communication and application level. We introduce the main concepts of ASLan++ at a small but very instructi...
متن کاملScene Segmentation and Image Feature Extraction in the DiVAN Video Indexing and Retrieval Architecture
We present a video analysis and indexing engine, that can perform fully automatic scene segmentation and feature extraction, in the context of a television archive. A template-based indexing engine is proposed, which interacts with a general-purpose video analysis server (providing spatio-temporal segmentation, feature extraction, feature clustering and feature matching services) and a template...
متن کاملSecuring Wireless Sensor Networks: Introducing ASLAN - A Secure Lightweight Architecture for WSNs
Wireless sensor networks consist of many small, inexpensive devices that have constraints in coverage, bandwidth, storage resources, communications ability and processing power. Therefore security issues are a critical concern due to possible exposure to malicious activity and potential threats. As a result of the physical constraints in sensor nodes, traditional cryptographic techniques are no...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: RumeliDE Dil ve Edebiyat Araştırmaları Dergisi
سال: 2020
ISSN: 2148-7782
DOI: 10.29000/rumelide.705636