Sciweavers

1352 search results - page 132 / 271
» Designing Security Requirements Models Through Planning
Sort
View
GLOBAL
2003
Springer
14 years 3 months ago
UML for Global Computing
Global systems – systems which may operate over transient networks including mobile elements and in which computation itself may be mobile – are gaining in importance. Neverthe...
Hubert Baumeister, Nora Koch, Piotr Kosiuczenko, P...
OOPSLA
2007
Springer
14 years 4 months ago
IAnticorruption: a domain-driven design approach to more robust integration
Custom House's new currency exchange system is integrated with a legacy system. After a few years of growth, the two systems were so intricately tangled that even small chang...
Sam Peng, Ying Hu
CCS
2008
ACM
14 years 4 days ago
Flexible and secure enterprise rights management based on trusted virtual domains
The requirements for secure document workflows in enterprises become increasingly sophisticated, with employees performing different tasks under different roles using the same pro...
Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, ...
WSC
1997
13 years 11 months ago
Integration of Simulation with Enterprise Models
The Enterprise Modeling Framework (EMF) consists of a methodology for modeling the three major facets of an enterprise, viz., function, information and dynamics. Its main goal is ...
Krishnamurthy Srinivasan, Sundaresan Jayaraman
CCS
2008
ACM
14 years 4 days ago
Securing group key exchange against strong corruptions
When users run a group key exchange (GKE) protocol, they usually extract the key from some auxiliary (ephemeral) secret information generated during the execution. Strong corrupti...
Emmanuel Bresson, Mark Manulis