Sciweavers

1352 search results - page 72 / 271
» Designing Security Requirements Models Through Planning
Sort
View
ASIACRYPT
2006
Springer
14 years 19 days ago
On the Security of OAEP
Currently, the best and only evidence of the security of the OAEP encryption scheme is a proof in the contentious random oracle model. Here we give further arguments in support of...
Alexandra Boldyreva, Marc Fischlin
ACSAC
2002
IEEE
14 years 1 months ago
Composable Tools For Network Discovery and Security Analysis
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...
ACSAC
2002
IEEE
14 years 1 months ago
A Context-Aware Security Architecture for Emerging Applications
We describe an approach to building security services for context-aware environments. Specifically, we focus on the design of security services that incorporate the use of securi...
Michael J. Covington, Prahlad Fogla, Zhiyuan Zhan,...
IMR
2003
Springer
14 years 2 months ago
Unified Geometry Access for Analysis and Design
This paper presents a comprehensive approach for CAD based geometry handling in support of single and multidisciplinary analysis and design. Unlike previous schemes, the model pre...
Robert Haimes, Curran Crawford
ATAL
2009
Springer
14 years 3 months ago
Agent-based intelligent collaborative care management
The aim of our research is to provide a unified model for the composition and management of consumer care services. We identify design, composition, distribution and management as...
Kumari Wickramasinghe, Christian Guttmann, Michael...