Sciweavers

1352 search results - page 97 / 271
» Designing Security Requirements Models Through Planning
Sort
View
MDM
2004
Springer
158views Communications» more  MDM 2004»
14 years 3 months ago
Semantic Location Modeling for Location Navigation in Mobile Environment
Location-based applications require a well-formed representation of spatial knowledge. Current location models can be classified into symbolic or geometric models. The former att...
Haibo Hu, Dik Lun Lee
SACRYPT
2005
Springer
138views Cryptology» more  SACRYPT 2005»
14 years 3 months ago
On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners
A vast amount of literature on stream ciphers is directed to the cryptanalysis of LFSR-based filters and combiners, resulting in various attack models such as distinguishing attac...
An Braeken, Joseph Lano
DRM
2004
Springer
14 years 3 months ago
A DRM security architecture for home networks
This paper describes a security architecture allowing digital rights management in home networks consisting of consumer electronic devices. The idea is to allow devices to establi...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
DAWAK
2009
Springer
13 years 7 months ago
Towards a Modernization Process for Secure Data Warehouses
Data Warehouses (DW) manage crucial enterprise information used for the decision making process which has to be protected from unauthorized accesses. However, security constraints ...
Carlos Blanco, Ricardo Pérez-Castillo, Arnu...
AAAI
2006
13 years 11 months ago
LOCATE Intelligent Systems Demonstration: Adapting Help to the Cognitive Styles of Users
LOCATE is workspace layout design software that also serves as a testbed for developing and refining principles of adaptive aiding. This demonstration illustrates LOCATE's ab...
Jack L. Edwards, Greg Scott