Sciweavers

1352 search results - page 91 / 271
» Designing Security Requirements Models Through Planning
Sort
View
CAISE
2003
Springer
14 years 2 months ago
On the Applicability of Rules to Automate Data Warehouse Logical Design
Data Warehouse logical design involves the definition of structures that enable an efficient access to information. The designer builds relational or multidimensional structures ta...
Verónika Peralta, Alvaro Illarze, Raul Rugg...
SAC
2005
ACM
14 years 2 months ago
AOP for software evolution: a design oriented approach
In this paper, we have briefly explored the aspect-oriented approach as a tool for supporting the software evolution. The aim of this analysis is to highlight the potentiality an...
Walter Cazzola, Sonia Pini, Massimo Ancona
CCS
2003
ACM
14 years 2 months ago
DoS protection for UDP-based protocols
Since IP packet reassembly requires resources, a denial of service attack can be mounted by swamping a receiver with IP fragments. In this paper we argue how this attack need not ...
Charlie Kaufman, Radia J. Perlman, Bill Sommerfeld
APWEB
2010
Springer
14 years 1 months ago
Optimizing Query Processing for the Hidden Web
Abstract. The term Deep Web (sometimes also called Hidden Web) refers to the data content that is created dynamically as the result of a specific search on the Web. In this respec...
Andrea Calì, Davide Martinenghi
MEDES
2010
ACM
13 years 3 months ago
Negotiating and delegating obligations
In this paper, we describe a security model where users are allowed to control their obligations partially or totally, depending on the security policy. The main motivation of our...
Meriam Ben-Ghorbel-Talbi, Frédéric C...