Sciweavers

1663 search results - page 39 / 333
» Computer Security in the Real World
Sort
View
ICPR
2002
IEEE
14 years 8 months ago
Interaction-Centric Modelling for Interactive Virtual Worlds: The APIA Approach
al modelling studies the different abstraction methods of the real world. The conception and the execution of virtual worlds depend strongly of the type of conceptual models. Exis...
Denis Laurendeau, Denis Poussart, François ...
EUROPKI
2008
Springer
13 years 9 months ago
A Privacy-Preserving eHealth Protocol Compliant with the Belgian Healthcare System
Real world healthcare systems are generally large and overly complex systems. Designing privacy-friendly protocols for such systems is a challenging task. In this paper we present ...
Bart De Decker, Mohamed Layouni, Hans Vangheluwe, ...
DARE
2000
75views more  DARE 2000»
13 years 9 months ago
Real-world programming
Although more and more computing is performed away from desktop computers, most programs used in handheld computers, ubiquitous computers, and augmented-reality systems in the rea...
Toshiyuki Masui
IEEESCC
2006
IEEE
14 years 1 months ago
Secure and Provable Service Support for Human-Intensive Real-Estate Processes
This paper introduces SOAR, a service-oriented architecture for the real-estate industry that embeds trust and security, allows for formal correctness proofs of service interactio...
Emerson Ribeiro de Mello, Savas Parastatidis, Phil...
IJNSEC
2008
164views more  IJNSEC 2008»
13 years 7 months ago
Secure Real-Time Streaming Protocol (RTSP) for Hierarchical Proxy Caching
Proxies are commonly used to cache objects, especially multimedia objects, so that clients can enjoy better quality-of-service (QoS) guarantees such as smaller startup latency and...
Yeung Siu Fung, John C. S. Lui, David K. Y. Yau