Sciweavers

1352 search results - page 151 / 271
» Designing Security Requirements Models Through Planning
Sort
View
CRYPTO
2009
Springer
121views Cryptology» more  CRYPTO 2009»
14 years 4 months ago
Collusion-Free Multiparty Computation in the Mediated Model
Collusion-free protocols prevent subliminal communication (i.e., covert channels) between parties running the protocol. In the standard communication model, if one-way functions ex...
Joël Alwen, Jonathan Katz, Yehuda Lindell, Gi...
IADIS
2004
13 years 11 months ago
A Different Pedagogical Approach to Teaching a Web Applications Course
This paper describes a different approach to teaching a web-applications course. Rather than lecturing, the instructor organizes material and serves as a guide as students work th...
Roy P. Pargas
WSC
2007
14 years 13 days ago
The simulation power of automod
Decision making in industry continues to become more complicated. Customers are more demanding, competition is more fierce, and costs for labor and raw materials continue to rise....
Todd LeBaron, Craig Jacobsen
CSMR
2006
IEEE
14 years 4 months ago
A Framework for Software Architecture Refactoring using Model Transformations and Semantic Annotations
Software-intensive systems evolve continuously under the pressure of new and changing requirements, generally leading to an increase in overall system complexity. In this respect,...
Igor Ivkovic, Kostas Kontogiannis
SIGCOMM
2010
ACM
13 years 10 months ago
capDL: a language for describing capability-based systems
Capabilities provide an access control model that can be used to construct systems where safety of protection can be precisely determined. However, in order to be certain of the s...
Ihor Kuz, Gerwin Klein, Corey Lewis, Adam Walker