Sciweavers

4719 search results - page 816 / 944
» Applications = Components GLoo
Sort
View
ECIS
2001
13 years 10 months ago
Structuration Theory and Information System Development - Frameworks for Practice
Giddens' structuration theory (ST) offers an account of social life in terms of social practices developing and changing over time and space, which makes no attempt to direct...
Jeremy Rose, Rens Scheepers
DBSEC
2003
113views Database» more  DBSEC 2003»
13 years 10 months ago
ECPV: Efficient Certificate Path Validation in Public-key Infrastructure
In the current public-key infrastructure (PKI) schemes based on X.509, a relying party must validate a user’s certificate as well as the existence of a path from its trust point...
Mahantesh Halappanavar, Ravi Mukkamala
ISICT
2004
13 years 10 months ago
Preventing type flaw attacks on security protocols with a simplified tagging scheme
A type flaw attack on a security protocol is an attack where a field in a message that was originally intended to have one type is subsequently interpreted as having another type. ...
Yafen Li, Wuu Yang, Ching-Wei Huang
MASCOTS
2004
13 years 10 months ago
Reliability of MEMS-Based Storage Enclosures
MEMS-based storage is a new, non-volatile storage technology currently under development. It promises fast data access, high throughput, high storage density, small physical size,...
Bo Hong, Thomas J. E. Schwarz, Scott A. Brandt, Da...
MODELLIERUNG
2004
13 years 10 months ago
CASE Support and Model-Based Development
ion from the implementation they use. Some tools rather consequently use this abstract model; others at least partly keep the implementational view, modeling components, e.g., by o...
Bernhard Schätz, Jan Romberg, Oscar Slotosch,...