Sciweavers

225 search results - page 32 / 45
» Definition and Analysis of Election Processes
Sort
View
CISC
2005
Springer
116views Cryptology» more  CISC 2005»
15 years 9 months ago
Specifying Authentication Using Signal Events in CSP
The formal analysis of cryptographic protocols has developed into a comprehensive body of knowledge, building on a wide variety of formalisms and treating a diverse range of securi...
Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider
ACSAC
2003
IEEE
15 years 8 months ago
Protecting Personal Data: Can IT Security Management Standards Help?
Compelled to improve information security by the introduction of personal data protection legislation, organizations worldwide are adopting standardized security management guidel...
Giovanni Iachello
ATAL
2003
Springer
15 years 8 months ago
Modelling secure multiagent systems
Security plays an important role in the development of multiagent systems. However, a careful analysis of software development processes shows that the definition of security requ...
Haralambos Mouratidis, Paolo Giorgini, Gordon A. M...
111
Voted
ECIS
2004
15 years 4 months ago
Constructing electronic government: the case of the UK inland revenue
The term electronic government (e-Government) generally refers to the use of information and communications technology (ICT) to change the structures and processes of government o...
Paul Beynon-Davies
116
Voted
EACL
1993
ACL Anthology
15 years 4 months ago
Resolving Zero Anaphora in Japanese
The paper presents a computational theory for resolving Japanese zero anaphora, based on the notion of discourse segment. We see that the discourse segment reduces the domain of a...
Tadashi Nomoto, Yoshihiko Nitta