Sciweavers

137 search results - page 6 / 28
» Group-Centric Models for Secure and Agile Information Sharin...
Sort
View
IJACTAICIT
2010
176views more  IJACTAICIT 2010»
13 years 4 months ago
A Secured Web Services Based E-Commerce Model for SMME Using Digital Identity
This paper deals with redesigning the existing e-commerce architecture that has provided a platform for the large companies to sell their products so that it can provide a place o...
Ashwin B. K., Kumaran K., Madhu Vishwanatham V., M...
ACSW
2003
13 years 9 months ago
A Secure Pervasive Environment
This paper explores the complications encountered when attempting to create a secure pervasive computing environment. The model introduced in this paper is primarily conceptual. T...
Patrick G. McLean
ACMSE
2008
ACM
13 years 9 months ago
Gnutella: integrating performance and security in fully decentralized P2P models
Peer-To-Peer (P2P) systems have made an enormous impact on the Internet, directly affecting its performance and security. The litigation against P2P file sharing has led some desi...
Rossana Motta, Wickus Nienaber, Jon Jenkins
MATES
2005
Springer
14 years 1 months ago
Collaborative Agent-Based Knowledge Support for Empirical and Knowledge-Intense Processes
Independent from specific application domains, similar requirements can be identified regarding information needs during daily work. For coping with generality on the one hand an...
Andrea Freßmann, Kerstin Maximini, Rainer Ma...
REFSQ
2010
Springer
13 years 9 months ago
Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations
[Context and motivation] The increasing demand of software systems to process and manage sensitive information has led to the need that software systems should comply with relevant...
Shareeful Islam, Haralambos Mouratidis, Stefan Wag...