Sciweavers

1352 search results - page 113 / 271
» Designing Security Requirements Models Through Planning
Sort
View
PROFES
2007
Springer
14 years 4 months ago
Project Cost Overrun Simulation in Software Product Line Development
The cost of a Software Product Line (SPL) development project sometimes exceeds the initially planned cost, because of requirements volatility and poor quality. In this paper, we p...
Makoto Nonaka, Liming Zhu, Muhammad Ali Babar, Mar...
MSA
2007
126views Multimedia» more  MSA 2007»
13 years 11 months ago
Semantic Modeling of Digital Multimedia
- The requirement for a commonly accepted efficient mapping between multimedia metadata standards and semantic web-ontology standards is a major issue recognized by semantic multim...
Babak Akhgar, Jawed I. A. Siddiqi, Fazilatur Rahma...
TCC
2007
Springer
102views Cryptology» more  TCC 2007»
14 years 4 months ago
Universally Composable Security with Global Setup
Abstract. Cryptographic protocols are often designed and analyzed under some trusted set-up assumptions, namely in settings where the participants have access to global information...
Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi W...
SAC
2009
ACM
14 years 4 months ago
Multi-step attack modelling and simulation (MsAMS) framework based on mobile ambients
Attackers take advantage of any security breach to penetrate an organisation perimeter and exploit hosts as stepping stones to reach valuable assets, deeper in the network. The exp...
Virginia N. L. Franqueira, Raul H. C. Lopes, Pasca...
ACSAC
2001
IEEE
14 years 1 months ago
CONSEPP: CONvenient and Secure Electronic Payment Protocol Based on X9.59
The security of electronic payment protocols is of interest to researchers in academia and industry. While the ultimate objective is the safest and most secure protocol, convenien...
Albert Levi, Çetin Kaya Koç