Sciweavers

1352 search results - page 94 / 271
» Designing Security Requirements Models Through Planning
Sort
View
GIS
2009
ACM
14 years 25 days ago
Towards modeling the traffic data on road networks
A spatiotemporal network is a spatial network (e.g., road network) along with the corresponding time-dependent weight (e.g., travel time) for each edge of the network. The design ...
Ugur Demiryurek, Bei Pan, Farnoush Banaei Kashani,...
WSC
2000
13 years 10 months ago
Applications of business process simulation and lean techniques in British Telecommunications PLC
Business processes are increasingly key to the success of companies in the service industry. It is important that these processes are designed and maintained to deliver the most c...
Simon Dennis, Ben C. King, Martin Hind, Stewart Ro...
ACSAC
2006
IEEE
14 years 3 months ago
Shamon: A System for Distributed Mandatory Access Control
We define and demonstrate an approach to securing distributed computation based on a shared reference monitor (Shamon) that enforces mandatory access control (MAC) policies acros...
Jonathan M. McCune, Trent Jaeger, Stefan Berger, R...
CCS
2009
ACM
14 years 1 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
HCI
2009
13 years 6 months ago
Activity Awareness and Social Sensemaking 2.0: Design of a Task Force Workspace
Task forces of expert knowledge workers would benefit from more advanced web tools supporting activity awareness and social sensemaking. This paper proposes the design of a task fo...
Gregorio Convertino, Lichan Hong, Les Nelson, Pete...