Sciweavers

1352 search results - page 107 / 271
» Designing Security Requirements Models Through Planning
Sort
View
KBSE
2005
IEEE
14 years 3 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
PPNA
2011
13 years 5 months ago
Security and privacy issues in P2P streaming systems: A survey
Streaming applications over Peer-To-Peer (P2P) systems have gained an enormous popularity. Success always implies increased concerns about security, protection, privacy and all the...
Gabriela Gheorghe, Renato Lo Cigno, Alberto Montre...
OOPSLA
2007
Springer
14 years 4 months ago
A framework for distributed collaborative conceptual model development
One of the major concerns in the processes which involve human analysts is the existence of uncertainty/inconsistency. In this paper, we propose a model based on belief theory tha...
Ebrahim Bagheri, Ali A. Ghorbani
ENTCS
2006
140views more  ENTCS 2006»
13 years 10 months ago
A Web Service Architecture for Enforcing Access Control Policies
Web services represent a challenge and an opportunity for organizations wishing to expose product and services offerings through the Internet. The Web service technology provides ...
Claudio Agostino Ardagna, Ernesto Damiani, Sabrina...
DRM
2008
Springer
13 years 12 months ago
RSA-TBOS signcryption with proxy re-encryption
The recent attack on Apple iTunes Digital Rights Management [17] has brought to light the usefulness of proxy re-encryption schemes for Digital Rights Management. It is known that...
Varad Kirtane, C. Pandu Rangan