Sciweavers

419 search results - page 43 / 84
» An Automated Approach for Identifying Potential Vulnerabilit...
Sort
View
HPCC
2007
Springer
14 years 1 months ago
Dynamic System-Wide Reconfiguration of Grid Deployments in Response to Intrusion Detections
As Grids become increasingly relied upon as critical infrastructure, it is imperative to ensure the highly-available and secure day-to-day operation of the Grid infrastructure. The...
Jonathan C. Rowanhill, Glenn S. Wasson, Zach Hill,...
DEXAW
2009
IEEE
111views Database» more  DEXAW 2009»
14 years 2 months ago
Integrating Security Patterns into the Electronic Invoicing Process
—The increasing automation of business processes is one of the main benefits of the ongoing technological evolution. Regarding e-invoices this automation process is still not op...
Michael Netter, Günther Pernul
USS
2010
13 years 5 months ago
Structuring Protocol Implementations to Protect Sensitive Data
In a bid to limit the harm caused by ubiquitous remotely exploitable software vulnerabilities, the computer systems security community has proposed primitives to allow execution o...
Petr Marchenko, Brad Karp
ECMDAFA
2009
Springer
170views Hardware» more  ECMDAFA 2009»
14 years 2 months ago
A Model Driven Approach to the Analysis of Timeliness Properties
The need for a design language that is rigorous but accessible and intuitive is often at odds with the formal and mathematical nature of languages used for analysis. UML and Petri ...
Mohamed Ariff Ameedeen, Behzad Bordbar, Rachid Ana...
DEXAW
2005
IEEE
172views Database» more  DEXAW 2005»
14 years 1 months ago
Business Process Management with Vague Data
Recent dynamics in the business world and the tough environment of globalization put enormous pressure on enterprises to be innovative. As a consequence, management concepts and I...
Oliver Thomas, Otmar Adam, Christian Seel