Sciweavers

1317 search results - page 63 / 264
» A New Design for a Practical Secure Cookies System
Sort
View
TEC
2002
166views more  TEC 2002»
15 years 4 months ago
An artificial immune system architecture for computer security applications
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch,...
WICSA
2008
15 years 5 months ago
Ready! Set! Go! An Action Research Agenda for Software Architecture Research
Software architecture practice is highly complex. Software architects interact with business as well as technical aspects of systems, often embedded in large and changing organiza...
Henrik Bærbak Christensen, Klaus Marius Hans...
HICSS
2002
IEEE
132views Biometrics» more  HICSS 2002»
15 years 9 months ago
Secure Transmission of the Prescription Order Communication System Based on the Internet and the Public-Key Infrastructure Using
This research paper presents a new system's design and development of the prescription order communication system (POCS) based on the Internet between the hospital and the ph...
Won Jay Song, Byung-Ha Ahn
CHI
2004
ACM
16 years 4 months ago
Putting the users center stage: role playing and low-fi prototyping enable end users to design mobile systems
This paper sums up lessons learned from a sequence of cooperative design workshops where end users were enabled to design mobile systems through scenario building, role playing, a...
Dag Svanaes, Gry Seland
TISSEC
2002
82views more  TISSEC 2002»
15 years 4 months ago
Trust management for IPsec
IPsec is the standard suite of protocols for networklayer confidentiality and authentication of Internet traffic. The IPsec protocols, however, do not address the policies for how...
Matt Blaze, John Ioannidis, Angelos D. Keromytis