Sciweavers

739 search results - page 82 / 148
» A security framework for the analysis and design of software...
Sort
View
JCSS
2011
154views more  JCSS 2011»
13 years 3 months ago
Model interoperability via Model Driven Development
It is widely recognised that software development is a complex process. Among the factors that contribute to its inherent complexity is the gap between the design and the formal a...
Mohamed Ariff Ameedeen, Behzad Bordbar, Rachid Ana...
SAC
2008
ACM
13 years 7 months ago
Profile based comparative analysis for AOSE methodologies evaluation
This study focuses on the analysis and evaluation of agentoriented methodologies. Different studies have been proposed for the evaluation of agent-oriented methodologies adopting ...
Luca Cernuzzi, Franco Zambonelli
AGENTS
2001
Springer
14 years 1 months ago
Improving the agent-oriented modeling process by roles
The agent-oriented modeling process is divided in a typical sequence of activities, i.e., requirements specification, analysis, and design. The requirements are specified by des...
Ralph Depke, Reiko Heckel, Jochen Malte Küste...
CHI
2005
ACM
14 years 9 months ago
How to make secure email easier to use
Cryptographically protected email has a justly deserved reputation of being difficult to use. Based on an analysis of the PEM, PGP and S/MIME standards and a survey of 470 merchan...
Simson L. Garfinkel, David Margrave, Jeffrey I. Sc...
IACR
2011
192views more  IACR 2011»
12 years 8 months ago
The Hummingbird-2 Lightweight Authenticated Encryption Algorithm
Hummingbird-2 is an encryption algorithm with a 128-bit secret key and a 64-bit initialization vector. Hummingbird-2 optionally produces an authentication tag for each message proc...
Daniel Engels, Markku-Juhani O. Saarinen, Peter Sc...