نتایج جستجو برای: oriented control

تعداد نتایج: 1442944  

2002
Jie Liu Johan Eker Xiaojun Liu John Reekie Edward A. Lee

Complex control systems are heterogeneous, in the sense of discrete computer-based controllers interacting with continuous physical plants, regular data sampling interleaving with usually irregular communication and user interaction, and multilayer and multimode control laws. This heterogeneity imposes great challenges for control system design technologies in terms of end-to-end control perfor...

2008
Daisy Daiqin He

Authorization control has been well studied for years, and there are quite a few theories and techniques available for handling access control for a single or a centralized system. However unique and challenging security issues concerning business collaboration in the context of service oriented computing (SOC) have arisen due to the dynamic and loosely coupling nature of the environment in whi...

2013
Dan Cristian Marinescu Dan Cristian MARINESCU

ABSI'RACI' Real-time control systems with a subset of processes subject to deadlines are investigated. The structure and the perfoImance of a class of such systems. namely the data acquisition and analysis systems are analyzed in case of procedure oriented as well as in the case of message oriented design. A methodology for system modeling and the approximations needed are discussed.

2005
Nathan Weston François Taïani Awais Rashid

A long-term research goal for Aspect-Oriented Programming is the modular verification of aspects such that safe evolution and reuse is facilitated. However, one of the fundamental problems with verifying aspect-oriented programs is the inability to determine the effect of the weaving process on the control flow of the program, and thus on the state of the system and subsequently the properties ...

Journal: :Information & Software Technology 2004
Indrakshi Ray Robert B. France Na Li Geri Georg

Specifying, enforcing and evolving access control policies is essential to prevent security breaches and unavailability of resources. These access control design concerns impose requirements that allow only authorized users to access protected computer-based resources. Addressing these concerns in a design results in the spreading of access control functionality across several design modules. T...

2010
Alejandro Mario Hernandez Flemming Nielson

We consider the use of aspect-oriented techniques as a flexible way to deal with security policies in distributed systems. Recent work suggests to use aspects for analysing the future behaviour of programs and to make access control decisions based on this; this gives the flavour of dealing with information flow rather than mere access control. We show in this paper that it is beneficial to aug...

Journal: :Computers & Security 2009
Azzam Mourad Andrei Soeanu Marc-André Laverdière Mourad Debbabi

In this paper, we present new pointcuts and primitives to Aspect-Oriented Programming (AOP) languages that are needed for systematic hardening of security concerns. The two proposed pointcuts allow to identify particular join points in a program’s control-flow graph (CFG). The first one is the GAFlow, Closest Guaranteed Ancestor, which returns the closest ancestor join point to the pointcuts of...

2010
Clark D. Thomborson

Actors in our general framework for secure systems can exert four types of control over other actors’ systems, depending on the temporality (prospective vs. retrospective) of the control and on the power relationship (hierarchical vs. peering) between the actors. We make clear distinctions between security, functionality, trust, and distrust by identifying two orthogonal properties: feedback an...

Journal: :Advances in Modelling and Analysis C 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید