Sciweavers

341 search results - page 37 / 69
» A Security Engineering Process based on Patterns
Sort
View
EUROPKI
2005
Springer
15 years 8 months ago
A Heterogeneous Network Access Service Based on PERMIS and SAML
Abstract The expansion of inter-organizational scenarios based on different authorization schemes involves the development of integration solutions allowing different authorizatio...
Gabriel López Millán, Óscar C...
112
Voted
HICSS
2005
IEEE
188views Biometrics» more  HICSS 2005»
15 years 8 months ago
Developing Group Decision Support Systems for Deception Detection
Achieving information assurance and security is a complex and challenging task, which is crucial from national and personal security point of views. Research in detecting deceptiv...
Amit V. Deokar, Therani Madhusudan
AVI
2000
15 years 3 months ago
Generating User Interface Code in a Model Based User Interface Development Environment
Declarative models play an important role in most software design activities, by allowing designs to be constructed that selectively abstract over complex implementation details. ...
Paulo Pinheiro da Silva, Tony Griffiths, Norman W....
WER
2007
Springer
15 years 8 months ago
Evolving Use Case Maps as a Scenario and Workflow Description Language
Since 1996, the core Use Case Map (UCM) notation has remained remarkably stable. As the structure and intent of workflow and scenario languages are very similar, UCMs have been ap...
Gunter Mussbacher
234
Voted
CCS
2011
ACM
14 years 2 months ago
PaperSpeckle: microscopic fingerprinting of paper
Paper forgery is among the leading causes of corruption in many developing regions [2]. In this paper, we introduce PaperSpeckle, a robust system that leverages the natural random...
Ashlesh Sharma, Lakshminarayanan Subramanian, Eric...