Sciweavers

1352 search results - page 177 / 271
» Designing Security Requirements Models Through Planning
Sort
View
HICSS
2002
IEEE
142views Biometrics» more  HICSS 2002»
14 years 1 months ago
Multi-perspective Enterprise Modeling (MEMO) - Conceptual Framework and Modeling Languages
For many companies, the strategic as well as the organizational fit of their information systems is a pivotal factor for staying competitive. At the same time, there is an increas...
Ulrich Frank
ISW
2004
Springer
14 years 2 months ago
Practical Authenticated Key Agreement Using Passwords
Due to the low entropy of human-memorable passwords, it is not easy to conduct password authenticated key agreement in a secure manner. Though there are many protocols achieving th...
Taekyoung Kwon
ICCCN
2008
IEEE
14 years 3 months ago
Group-Oriented Communication: Concept and Network Architecture
—In this paper, we propose a novel communication paradigm called group-oriented communication. Different from conventional unicast-based communications, group-oriented communicat...
Yousuke Takahashi, Kouhei Sugiyama, Hiroyuki Ohsak...
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 9 months ago
Mosaic: Policy Homomorphic Network Extension
With the advent of large-scale cloud computing infrastructures, network extension has emerged as a major challenge in the management of modern enterprise networks. Many enterprise...
L. Erran Li, Michael F. Nowlan, Y. R. Yang
NOSSDAV
2001
Springer
14 years 1 months ago
Dimensioning server access bandwidth and multicast routing in overlay networks
Application-level multicast is a new mechanism for enabling multicast in the Internet. Driven by the fast growth of network audio/video streams, application-level multicast has be...
Sherlia Shi, Jonathan S. Turner, Marcel Waldvogel