Sciweavers

883 search results - page 87 / 177
» Getting the right design and the design right
Sort
View
IEEEARES
2007
IEEE
14 years 3 months ago
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing
Identity theft through phishing attacks has become a major concern for Internet users. Typically, phishing attacks aim at luring the user to a faked web site to disclose personal ...
Sebastian Gajek, Ahmad-Reza Sadeghi, Christian St&...
CRYPTO
2007
Springer
106views Cryptology» more  CRYPTO 2007»
14 years 3 months ago
Information Security Economics - and Beyond
The economics of information security has recently become a thriving and fast-moving discipline. As distributed systems are assembled from machines belonging to principals with div...
Ross Anderson, Tyler Moore
ECTEL
2007
Springer
14 years 3 months ago
Role Based Access Control for the Interaction with Search Engines
Search engine-based features are a basic interaction mean for users to find information inside a Web-based Learning Management Systems (LMS); nonetheless, traditional solutions la...
Alessandro Bozzon, Tereza Iofciu, Wolfgang Nejdl, ...
AOSE
2005
Springer
14 years 2 months ago
Incorporating Commitment Protocols into Tropos
This paper synthesizes two trends in the engineering of agent-based systems. One, modern agent-oriented methodologies deal with the key aspects of software development including re...
Ashok U. Mallya, Munindar P. Singh
EPEW
2005
Springer
14 years 2 months ago
Reasoning About Interaction Patterns in Choreography
Choreography languages provide a top-view design way for describing complex systems composed of services distributed over the network. The basic building block of such languages is...
Roberto Gorrieri, Claudio Guidi, Roberto Lucchi