The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The existent models aiming at information security risk analysis primary startle the problem from a technical view. Although the knowledge based approaches are studied for information security risk analysis, they are limited in rule presentation and assessing management. The bottom-up approaches fails to effectively support the security decision and control. The purpose of this study is to study a...
Along with the thorough development and application for Web services, the security of it has taken people??s attention more and more. While Web services security (WSS) can exchange safe SOAP message and enhance the security of Web services, it will also have certain influence to the performance of Web services. In order to satisfy the security of it , to reduce the performance influence of Web services...
One model for barrier coverage in sensor networks is Maximal Breach Path (MBP). Many proposed methods for searching MBP are just for 0-dimensional point targets. Xie proposed a coverage analysis approach for sensor networks based on Clifford algebra. In a 2-dimensional plane, a homogeneous computational method of distance measures has been provided for points, lines and areas, and a homogeneous coverage...
Common information model (CIM) is an object model for describing and sharing enterprise wide management information. It covers the gamut-network, systems and application management definitions-in a far more comprehensive way. This paper probes into the concept, attribute and classify of the common information model, and also discusses the function, content, the characters and problems of common information...
This article studied on the optimal model of kidney exchange policy. Analysis yielded several bottleneck factors that affect the efficiency in the process of matching access of the kidney transplantation: ABO Blood Type, Age, Waiting time, kidney quality, etc. Taking into consideration of these factors, we developed a mathematical model of game theory and statistical method to measure the overall...
The UML activity diagrams (ADs), are lack of formal semantics in UML official specifications and therefore they cannot be performed formal system behavior analysis. This paper firstly employs the Hoare's CSP (communicating sequential processes) to formalize the behaviors of UML ADs and hence it can provide an approach to model checking UML ADs during software analysis or design stage since CSP is...
In this paper, after analyzing the requirement of aspect-oriented modeling, a meta-model based on UML extension profile for AOM is proposed, a framework of aspect-oriented modeling (AOMF) with UML is built, and a simple and feasible way to model the dynamic behaviors of aspect-oriented software is presented. Furthermore, a case study is presented to demonstrate the effectiveness and advantages of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.