Sciweavers

3451 search results - page 69 / 691
» Collaborative attack modeling
Sort
View
ACSAC
2009
IEEE
14 years 3 months ago
On the Security of PAS (Predicate-Based Authentication Service)
—Recently a new human authentication scheme called PAS (predicate-based authentication service) was proposed, which does not require the assistance of any supplementary device. T...
Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, A...
ICEBE
2006
IEEE
125views Business» more  ICEBE 2006»
14 years 3 months ago
A Business Collaboration Registry Model on Top of ebRIM
UN/CEFACT’s Modeling Methodology (UMM) is a well accepted approach to define inter-organizational business processes. UMM models should be managed in a registry for two reasons...
Birgit Hofreiter, Christian Huemer, Marco Zapletal
LAWEB
2003
IEEE
14 years 2 months ago
Methodological Aspects in Designing Web-Based Collaborative Systems
This work presents methodological aspects related with the development of web-based collaboration systems in Design and Education. Collaboration is highlighted as the fundamental ...
José A. Aravena Reyes, Mauricio L. Aguilar ...
ICSE
2007
IEEE-ACM
14 years 9 months ago
Collaboration in Software Engineering: A Roadmap
Software engineering projects are inherently cooperative, requiring many software engineers to coordinate their efforts to produce a large software system. Integral to this effort...
Jim Whitehead
HYBRID
2009
Springer
14 years 3 months ago
Safe and Secure Networked Control Systems under Denial-of-Service Attacks
Abstract. We consider the problem of security constrained optimal control for discrete-time, linear dynamical systems in which control and measurement packets are transmitted over ...
Saurabh Amin, Alvaro A. Cárdenas, Shankar S...