Sciweavers

3451 search results - page 76 / 691
» Collaborative attack modeling
Sort
View
ADC
2009
Springer
122views Database» more  ADC 2009»
14 years 3 months ago
What is Required in Business Collaboration?
Access control has been studied for sometime, and there are a number of theories and techniques for handling access control for single or centralised systems; however, unique and ...
Daisy Daiqin He, Michael Compton, Kerry Taylor, Ji...
ACSW
2007
13 years 10 months ago
Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks
Low latency anonymous network systems, such as Tor, were considered secure against timing attacks when the threat model does not include a global adversary. In this threat model t...
Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Sa...
DSRT
1999
IEEE
14 years 1 months ago
Collaborative Virtual Environment Standards: A Performance Evaluation
Collaborative Virtual Environments are virtual reality spaces that enable participants to collaborate and share objects as if physically present in the same place. These collabora...
Jauvane C. de Oliveira, Shervin Shirmohammadi, Nic...
ACSC
2005
IEEE
14 years 2 months ago
Modelling and Measuring Collaborative Software Engineering
Collaborative Software Engineering (CSE) supports the fine-grained real-time development of software by teams of developers located anywhere on the Internet. In this paper we des...
Carl Cook, Neville Churcher
GCC
2003
Springer
14 years 2 months ago
A Research on the Framework of Grid Manufacturing
This paper presents firstly in the world the framework of Grid manufacturing, which neatly combines Grid technology with the infrastructure of advanced manufacturing technology. It...
Li Chen, Hong Deng, Qianni Deng, Zhenyu Wu