Sciweavers

1352 search results - page 99 / 271
» Designing Security Requirements Models Through Planning
Sort
View
ACSAC
2000
IEEE
14 years 2 months ago
Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking
We present a vision of computing environments in which enterprise networks are built using untrusted public infrastructures. The vision allows for networks to dynamically change d...
Germano Caronni, S. Kumar, Christoph L. Schuba, Gl...
CORR
2004
Springer
80views Education» more  CORR 2004»
13 years 10 months ago
Notes On The Design Of An Internet Adversary
The design of the defenses Internet systems can deploy against attack, especially adaptive and resilient defenses, must start from a realistic model of the threat. This requires an...
David S. H. Rosenthal, Petros Maniatis, Mema Rouss...
ECIS
2001
13 years 11 months ago
Design of Web-Based Information Systems - New Challenges for Systems Development?
The web-technology is going through major changes these years, both with respect to types of systems based on web-technology, organization of the development work, required approa...
Peter H. Carstensen, Lasse Vogelsang
JMS
2010
139views more  JMS 2010»
13 years 8 months ago
Application of Portable CDA for Secure Clinical-document Exchange
Health Level Seven (HL7) organization published the Clinical Document Architecture (CDA) for exchanging documents among heterogeneous systems and improving medical quality based on...
Kuo-Hsuan Huang, Sung-huai Hsieh, Yuan-Jen Chang, ...
AGENTS
1999
Springer
14 years 2 months ago
A Personal News Agent That Talks, Learns and Explains
Most work on intelligent information agents has thus far focused on systems that are accessible through the World Wide Web. As demanding schedules prohibit people from continuous ...
Daniel Billsus, Michael J. Pazzani