153
click to vote
WMC
15 years 1 months ago
2004
: Testing of a software application serves the accomplishment of two dis tinct objectives: ensuring functionality and end-user acceptance. However, with an increasing desire for mo...
143
Voted
EGCDMAS
15 years 1 months ago
2004
Security policies are abstract descriptions of how a system should behave to be secure. They typically express what is obligatory, permitted, or forbidden in the system. When the s...
140
click to vote
ECWEB
15 years 5 months ago
2004 Springer
Abstract. Most e-commerce Web sites dynamically generate their contents through a three-tier server architecture composed of a Web server, an application server, and a database ser...
123
Voted
SIGECOM
15 years 5 months ago
2004 ACM
The increasing popularity of resource exchange through peerto-peer networks has encouraged the development of ways to support more complex commercial transactions over these netwo...
117
Voted
ACMICEC
15 years 5 months ago
2004 ACM
Electronic voting has become one of the most popular activities over the Internet. Security and privacy are always regarded as crucial factors in electronic voting system design. ...
|