Sciweavers

3482 search results - page 216 / 697
» Designing for security
Sort
View
151
Voted
AUSFORENSICS
2003
15 years 4 months ago
Identifying Trends in the Deployment and Security of 802.11b Wireless Technology, in Perth, W.A
Many organisations and individuals are installing wireless local area networks (WLANs), which are based on the IEEE 802.11b standard. Insecurely configured WLANs present a threat ...
Sue Webb
115
Voted
WSC
1998
15 years 4 months ago
Discrete-Event Simulation for the Design and Evaluation of Physical Protection Systems
This paper explores the use of discrete-event simulation for the design and control of physical protection systems for fixed-site facilities housing items of significant value. It...
Sabina E. Jordan, Mark K. Snell, Marcella M. Madse...
CCS
2008
ACM
15 years 4 months ago
Flexible and secure enterprise rights management based on trusted virtual domains
The requirements for secure document workflows in enterprises become increasingly sophisticated, with employees performing different tasks under different roles using the same pro...
Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, ...
110
Voted
OOPSLA
2007
Springer
15 years 9 months ago
Supporting systems QoS design and evolution through model transformations
We describe Quality of service pICKER (QUICKER), a model-driven QoS mapping toolchain for supporting the QoS design and evolution of systems software. QUICKER automates the mappin...
Amogh Kavimandan, Aniruddha S. Gokhale
89
Voted
OOPSLA
2005
Springer
15 years 8 months ago
Pluggable AOP: designing aspect mechanisms for third-party composition
Studies of Aspect-Oriented Programming (AOP) usually focus on a language in which a specific aspect extension is integrated with a base language. Languages specified in this man...
Sergei Kojarski, David H. Lorenz