Sciweavers

1352 search results - page 160 / 271
» Designing Security Requirements Models Through Planning
Sort
View
ICLP
2004
Springer
14 years 3 months ago
Applying CLP to Predict Extra-Functional Properties of Component-Based Models
A component is the basic re-usable unit of composition to build composite systems by connecting to others through their provided and required ports. Checking the functional complia...
Olivier Defour, Jean-Marc Jézéquel, ...
JODS
2008
152views Data Mining» more  JODS 2008»
13 years 10 months ago
Deploying Semantic Web Services-Based Applications in the e-Government Domain
Joining up services in e-Government usually implies governmental agencies acting in concert without a central control regime. This requires to the sharing scattered and heterogeneo...
Alessio Gugliotta, John Domingue, Liliana Cabral, ...
IUI
2000
ACM
14 years 2 months ago
Adaptive medical information delivery combining user, task and situation models
Medical information delivery for users with different levels of expertise will be required for the manned mission to Mars due to limited potential for communication with Earth. Th...
Luis Francisco-Revilla, Frank M. Shipman III
APWEB
2008
Springer
13 years 11 months ago
Protecting Information Sharing in Distributed Collaborative Environment
Abstract. Information sharing on distributed collaboration usually occurs in broad, highly dynamic network-based environments, and formally accessing the resources in a secure mann...
Min Li, Hua Wang
IPCCC
2005
IEEE
14 years 3 months ago
Source routing based pairwise key establishment protocol for sensor networks
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. The establishment...
D. Huang, M. Mehta, D. Medhi