Sciweavers

225 search results - page 32 / 45
» Definition and Analysis of Election Processes
Sort
View
CISC
2005
Springer
116views Cryptology» more  CISC 2005»
14 years 2 months ago
Specifying Authentication Using Signal Events in CSP
The formal analysis of cryptographic protocols has developed into a comprehensive body of knowledge, building on a wide variety of formalisms and treating a diverse range of securi...
Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider
ACSAC
2003
IEEE
14 years 1 months ago
Protecting Personal Data: Can IT Security Management Standards Help?
Compelled to improve information security by the introduction of personal data protection legislation, organizations worldwide are adopting standardized security management guidel...
Giovanni Iachello
ATAL
2003
Springer
14 years 1 months ago
Modelling secure multiagent systems
Security plays an important role in the development of multiagent systems. However, a careful analysis of software development processes shows that the definition of security requ...
Haralambos Mouratidis, Paolo Giorgini, Gordon A. M...
ECIS
2004
13 years 10 months ago
Constructing electronic government: the case of the UK inland revenue
The term electronic government (e-Government) generally refers to the use of information and communications technology (ICT) to change the structures and processes of government o...
Paul Beynon-Davies
EACL
1993
ACL Anthology
13 years 10 months ago
Resolving Zero Anaphora in Japanese
The paper presents a computational theory for resolving Japanese zero anaphora, based on the notion of discourse segment. We see that the discourse segment reduces the domain of a...
Tadashi Nomoto, Yoshihiko Nitta