Sciweavers

75 search results - page 10 / 15
» Extending virtual organizations to improve trust mechanisms
Sort
View
CCS
2009
ACM
14 years 2 months ago
MYSEA: the monterey security architecture
Mandated requirements to share information across different sensitivity domains necessitate the design of distributed architectures to enforce information flow policies while pr...
Cynthia E. Irvine, Thuy D. Nguyen, David J. Shiffl...
GLOBECOM
2010
IEEE
13 years 5 months ago
SplitAP: Leveraging Wireless Network Virtualization for Flexible Sharing of WLANs
Providing air-time guarantees across a group of clients forms a fundamental building block in sharing an access point (AP) across different virtual network providers. Though this p...
Gautam D. Bhanage, Dipti Vete, Ivan Seskar, Dipank...
ATAL
2009
Springer
13 years 8 months ago
Conditional Dependence Networks in Requirements Engineering
In this paper we present a new model for the requirements analysis of a system. We offer a conceptual model defined following a visual modeling language, called dependence networks...
Guido Boella, Leendert van der Torre, Serena Villa...
IGPL
2010
125views more  IGPL 2010»
13 years 6 months ago
A normative multiagent approach to requirements engineering
In this paper we present a new model for the requirements analysis of a system. We offer a conceptual model defined following a visual modeling language, called dependence network...
Serena Villata
ESORICS
2009
Springer
14 years 8 months ago
Authentic Time-Stamps for Archival Storage
Abstract. We study the problem of authenticating the content and creation time of documents generated by an organization and retained in archival storage. Recent regulations (e.g.,...
Alina Oprea, Kevin D. Bowers