Sciweavers

626 search results - page 104 / 126
» Analysing Security Requirements of Information Systems Using...
Sort
View
IRI
2006
IEEE
14 years 1 months ago
Toward component non-functional interoperability analysis: A UML-based and goal-oriented approach
Component interoperability is the ability of two or more components to cooperate despite their differences in functional and non-functional aspects such as security or performanc...
Sam Supakkul, Ebenezer A. Oladimeji, Lawrence Chun...
WPES
2003
ACM
14 years 28 days ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett
PODC
2003
ACM
14 years 28 days ago
Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures
Applications such as e-commerce payment protocols, electronic contract signing, and certified e-mail delivery require that fair exchange be assured. A fair-exchange protocol allo...
Jung Min Park, Edwin K. P. Chong, Howard Jay Siege...
COMSUR
2007
101views more  COMSUR 2007»
13 years 7 months ago
A survey of covert channels and countermeasures in computer network protocols
Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to ...
Sebastian Zander, Grenville J. Armitage, Philip Br...
ELPUB
2006
ACM
14 years 1 months ago
A New Concept in High Resolution Internet Image Browsing
Various new imaging techniques have been used at the C2RMF, in order to digitize paintings and objects. These techniques are used for extensive and detailed non-destructive analys...
Denis Pitzalis, Ruven Pillay, Christian Lahanier