نتایج جستجو برای: multilevel security

تعداد نتایج: 204436  

2004
SHYI-LONG LEE YEUNG-LONG LUO BRUCE E. SAGAN YEONG-NAN YEH

A multilevel circulant is defined as a graph whose adjacency matrix has a certain block decomposition into circulant matrices. A general algebraic method for finding the eigenvectors and the eigenvalues of multilevel circulants is given. Several classes of graphs, including regular polyhedra, suns, and cylinders can be analyzed using this scheme.

2005
Guillaume Gardey John Mullins Olivier H. Roux O. H. Roux

In this paper, the problem of synthesizing controllers that ensures non interference for multilevel security dense timed discrete event systems modeled by an extension of Timed Automata, is addressed for the first time. We first discuss a notion of non interference for dense real-time systems that refines notions existing in the literature and investigate decidability issues raised by the verif...

2013
J. G. R. Sathiaseelan

The exorbitant growth in the field of web services technology has challenged the web developers, vendors and researchers to design and development a variety of enterprise web applications for diverse organizations. Since, security is considered to be an essential part in the development of web applications, web services security has also become an emerging trend in Web services technology. Even...

2001
Jan Jürjens

We show how UML (the industry standard in object-oriented modelling) can be used to express security requirements during system development. Using the extension mechanisms provided by UML, we incorporate standard concepts from formal methods regarding multi-level secure systems and security protocols. These definitions evaluate diagrams of various kinds and indicate possible vulnerabilities. On...

1999
Myong H. Kang Judith N. Froscher Amit P. Sheth Krys J. Kochut John A. Miller

The Department of Defense (DoD) needs multilevel secure (MLS) workflow management systems to enable globally distributed users and applications to cooperate across classification levels to achieve mission critical goals. An MLS workflow management system that allows a user to program multilevel mission logic, to securely coordinate widely distributed tasks, and to monitor the progress of the wo...

2004
M. Kokkolaras

In this paper we consider hierarchically decomposed multilevel systems, and extend previous deterministic methodologies for optimal and consistent design of such systems to account for the presence of uncertainties. Specifically, we use the probabilistic formulation of the analytical target cascading process to solve the multilevel problem, and use an advanced mean value-based technique to esti...

Journal: :Manufacturing & Service Operations Management 2014
Hossein Abouee-Mehrizi Opher Baron Oded Berman

W consider a two-echelon inventory system with a capacitated centralized production facility and several distribution centers (DCs). Both production and transportation times are stochastic with general distributions. Demand arrives at each DC according to an independent Poisson process and is backlogged if the DC is out of stock. We allow different holding and backlog costs at the different DCs...

2018
Ioannis Tsaousis Georgios D. Sideridis Khaleel Al-Harbi

Citation: Tsaousis I, Sideridis GD and Al-Harbi K (2018) Examining Differences in Withinand Between-Person Simple Structures of an Engineering Qualification Test Using Multilevel MIMIC Structural Equation Modeling. Front. Appl. Math. Stat. 4:3. doi: 10.3389/fams.2018.00003 Examining Differences in Withinand Between-Person Simple Structures of an Engineering Qualification Test Using Multilevel M...

2002
B. Aziz

We present a non-uniform static analysis for the π-calculus that is built on a denotational semantics of the language and is useful in detecting instances of information leakage and insecure communications in systems with multi-level security policies. To ensure the termination of the analysis, we propose an abstraction, which maintains a finite number of names to be generated by any process. W...

2012
Chao Lee Lihua Yin Yunchuan Guo

Wireless sensor network is one of the fundamental components of the Internet of Things. With the growing use of wireless sensor networks in commercial and military, data security is a critical problem in these applications. Considerable security works have been studied. However, the majority of these works based on the scenarios that the sensitivities of data in the networks are in the same. In...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید