Sciweavers

3482 search results - page 191 / 697
» Designing for security
Sort
View
CADUI
2004
13 years 10 months ago
A Design Toolkit for Hypermedia Applications Based on Ariadne Development Method
The development process of hypermedia applications implies very specific problems mainly related, first, to the use of navigational structures, interactive behaviours and multimed...
Susana Montero, Camino Fernández, Juan Manu...
JPDC
2006
141views more  JPDC 2006»
13 years 9 months ago
M-TREE: A high efficiency security architecture for protecting integrity and privacy of software
Secure processor architectures enable new sets of applications such as commercial grid computing, software copy protection and secure mobile agents by providing secure computing e...
Chenghuai Lu, Tao Zhang, Weidong Shi, Hsien-Hsin S...
ECBS
2008
IEEE
86views Hardware» more  ECBS 2008»
14 years 3 months ago
A Formal Model for Network-Wide Security Analysis
Network designers perform challenging tasks with so many configuration options that it is often hard or even impossible for a human to predict all potentially dangerous situation...
Petr Matousek, Jaroslav Ráb, Ondrej Rysavy,...
HICSS
2008
IEEE
138views Biometrics» more  HICSS 2008»
14 years 3 months ago
Cyber Security and Government Fusion Centers
The Department of Homeland Security has recommended the creation of State, Regional, and Community Fusion Centers. These centers, run by state and local governments, are designed ...
Natalie Granado, Gregory White
MUE
2008
IEEE
218views Multimedia» more  MUE 2008»
14 years 3 months ago
I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks
Ad hoc networks are highly dynamic routing networks cooperated by a collection of wireless mobile hosts without any assistance of centralized access point. Secure Efficient Ad hoc...
Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Ch...