Sciweavers

1352 search results - page 74 / 271
» Designing Security Requirements Models Through Planning
Sort
View
ACMDIS
2010
ACM
13 years 7 months ago
Designing for the invisible: user-centered design of infrastructure awareness systems
Infrastructure awareness systems reveal invisible aspects of infrastructures to their existing or potential users. Designing such systems is challenging as it requires making visi...
Juan David Hincapié-Ramos, Aurélien ...
ACSW
2003
13 years 10 months ago
A Secure Pervasive Environment
This paper explores the complications encountered when attempting to create a secure pervasive computing environment. The model introduced in this paper is primarily conceptual. T...
Patrick G. McLean
MAS
1998
Springer
145views Communications» more  MAS 1998»
14 years 1 months ago
Language Issues in Mobile Program Security
Abstract. Many programming languages have been developed and implemented for mobile code environments. They are typically quite expressive. But while security is an important aspec...
Dennis M. Volpano, Geoffrey Smith
MMMACNS
2010
Springer
13 years 7 months ago
Group-Centric Models for Secure and Agile Information Sharing
Abstract. To share information and retain control (share-but-protect) is a classic cyber security problem for which effective solutions continue to be elusive. Where the patterns o...
Ravi S. Sandhu, Ram Krishnan, Jianwei Niu, William...
NGC
2007
Springer
128views Communications» more  NGC 2007»
13 years 8 months ago
User-oriented Security Supporting Inter-disciplinary Life Science Research across the Grid
Abstract Understanding potential genetic factors in disease or development of personalised e-Health solutions require scientists to access a multitude of data and compute resources...
Richard O. Sinnott, Oluwafemi Ajayi, Jipu Jiang, A...