Sciweavers

597 search results - page 78 / 120
» A Pattern System for Security Requirements Engineering
Sort
View
CCS
2008
ACM
13 years 9 months ago
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps
Single-Sign-On (SSO) protocols enable companies to establish a federated environment in which clients sign in the system once and yet are able to access to services offered by dif...
Alessandro Armando, Roberto Carbone, Luca Compagna...
CCS
2010
ACM
13 years 4 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
IJCSA
2006
289views more  IJCSA 2006»
13 years 7 months ago
Cash Forecasting: An Application of Artificial Neural Networks in Finance
Artificial Neural Networks are universal and highly flexible function approximators first used in the fields of cognitive science and engineering. In recent years, Neural Networks...
PremChand Kumar, Ekta Walia
RBAC
1997
135views more  RBAC 1997»
13 years 9 months ago
Reconciling role based management and role based access control
Role Based Access Control is only a subset of the security management and distributed systems management. Yet, the characteristics and use of the role objects in RBAC or Role Base...
Emil Lupu, Morris Sloman
SEKE
2004
Springer
14 years 29 days ago
Information Integration Architecture Development: A Multi-Agent Approach
Multi-Agent Systems (MAS) architectures are gaining popularity for building open, distributed, and evolving software required by systems such as information integration application...
Stéphane Faulkner, Manuel Kolp, Tai Nguyen,...