Sciweavers

626 search results - page 32 / 126
» Analysing Security Requirements of Information Systems Using...
Sort
View
ACSAC
1999
IEEE
14 years 2 months ago
A Distributed Certificate Management System (DCMS) Supporting Group-Based Access Controls
Mainly for scalability reasons, many cryptographic security protocols make use of public key cryptography and require the existence of a corresponding public key infrastructure (P...
Rolf Oppliger, Andreas Greulich, Peter Trachsel
HICSS
1999
IEEE
155views Biometrics» more  HICSS 1999»
14 years 2 months ago
Agent Communication Languages for Information-Centric Agent Communities
As the complexity and application scope of agent-based systems increases, the requirements placed on Agent Communication Languages have also increased with it. Currently-available...
Marian H. Nodine, Damith Chandrasekara
IPAW
2010
13 years 7 months ago
Towards a Threat Model for Provenance in e-Science
Abstract. Scientists increasingly rely on workflow management systems to perform large-scale computational scientific experiments. These systems often collect provenance informatio...
Luiz M. R. Gadelha Jr., Marta Mattoso, Michael Wil...
BMCBI
2010
149views more  BMCBI 2010»
13 years 10 months ago
KID - an algorithm for fast and efficient text mining used to automatically generate a database containing kinetic information o
Background: The amount of available biological information is rapidly increasing and the focus of biological research has moved from single components to networks and even larger ...
Stephanie Heinen, Bernhard Thielen, Dietmar Schomb...
CAISE
2010
Springer
13 years 5 months ago
In Search of the Holy Grail: Integrating Social Software with BPM Experience Report
The paper is devoted to finding a view on business processes that helps to introduce into business process support systems a notion of shared spaces widely used in social software....
Ilia Bider, Paul Johannesson, Erik Perjons