منابع مشابه
Towards Safe and Secure Organic Computing Applications
In this paper we present our ongoing work on “Organic Computing”. We present an illustrative case study from program automation that uses OC-paradigms to be failure tolerant and to produce effectively. We present a way to build and verify a formal model of a self-adaptive system. We also give further ideas for formal modeling and our ideas of safety analysis of such systems. Another topic is ho...
متن کاملSecure Safe Ambients and JVM Security
Safe Ambients are a variant of Cardelli and Gordon’s Mobile Ambients [CG98] proposed by Levi and Sangiorgi in [LS00]. The two calculi differ in the underlying notion of interaction: in Mobile Ambients interaction between ambients are “one-sided”, in that one of the two partners in a move or open action simply undergoes the action. In Safe ambients, instead, the reduction relation requires actio...
متن کاملMultiMedia Instruction in Safe and Secure Systems
The aim of the MMiSS project is the construction of a multimedia Internet-based adaptive educational system. Its content will initially cover a curriculum in the area of Safe and Secure Systems. Traditional teaching materials (slides, handouts, annotated course material, assignments, and so on) are to be converted into a new hypermedia format, integrated with tool interactions for formally deve...
متن کاملSecure Ad-hoc Pairing with Biometrics: SAfE
The pairing problem is to enable two devices, which share no prior context with each other, to agree upon a security association that they can use to protect their subsequent communication. Secure pairing should offer guarantees of the association partner’s identity and it should be resistant to eavesdropping or to a man-in the middle attack. We propose a user friendly solution to this problem....
متن کاملSafe Authentication Protocol for Secure USB Memories
Due to its portability and accesibility, the USB memory has become one of the most popular storage devices. However, if the device is lost, stolen or hacked, it can lead to critical information leakage. It is natural that malicious insiders would try to thieve their colleagues’ USB memories. Consequently, various security-incorporated USB products have been developed. To our best knowledge, the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of Thoracic and Cardiovascular Surgery
سال: 2018
ISSN: 0022-5223
DOI: 10.1016/j.jtcvs.2018.07.077