Sciweavers

3420 search results - page 77 / 684
» A Language-Based Approach to Security
Sort
View
ECIS
2004
13 years 11 months ago
Agile Security For Information Warfare: A Call For Research
The context of information security is changing dramatically. Networking technologies have driven the global expansion of electronic commerce. Electronic commerce is increasingly ...
Richard Baskerville
ESCIENCE
2006
IEEE
14 years 4 months ago
Supporting Decentralized, Security Focused Dynamic Virtual Organizations across the Grid
The ability to dynamically create and subsequently manage secure virtual organisations (VO) is one of the key challenges facing the Grid community. Existing approaches for establi...
Richard O. Sinnott, David W. Chadwick, Jos Koetsie...
GCC
2004
Springer
14 years 3 months ago
A Software Engineering Perspective for Services Security
Services are usually developed and deployed independently; and systems can be formed by composing relevant services to achieve set goals. In such an open and dynamic environment, s...
Jun Han
TPHOL
2003
IEEE
14 years 3 months ago
Verifying Second-Level Security Protocols
Abstract. A second-level security protocol is defined as a security protocol that relies on an underlying security protocol in order to achieve its goals. The verification of cla...
Giampaolo Bella, Cristiano Longo, Lawrence C. Paul...
GI
2007
Springer
14 years 1 months ago
Agent-Based Container Security Systems: An Interdisciplinary Perspective
: Container security systems including electronic seals play an important role in securing container logistics. Nevertheless, a lack of standards prevents devices by different vend...
Sven Werner, Arne Schuldt, Kateryna Daschkovska