Sciweavers

1005 search results - page 55 / 201
» Information systems security engineering: a critical compone...
Sort
View
CCECE
2006
IEEE
14 years 2 months ago
Evaluation Patterns of Tele-Haptics
Multimedia and Information technology are reaching limits in terms of what can be done in multimedia applications with only sight and sound. The next critical step is to bring the...
Xiaojun Shen, Jilin Zhou, Nicolas D. Georganas
CLA
2007
13 years 10 months ago
Precalculating Component Interface Compatibility using FCA
In component-based software engineering, software systems are built by assembling prefabricated reusable components. The compatibility between the assembled components is crucial. ...
Gabriela Arévalo, Nicolas Desnos, Marianne ...
FOSSACS
2010
Springer
14 years 3 months ago
The Complexity of Synchronous Notions of Information Flow Security
The paper considers the complexity of verifying that a finite state system satisfies a number of definitions of information flow security. The systems model considered is one i...
Franck Cassez, Ron van der Meyden, Chenyi Zhang
COMPSAC
2008
IEEE
13 years 10 months ago
Fabrication of Ontology for Security in Health Care Systems
Given the widespread intimidation state of affairs, there is a gripping want to enlarge architectures, algorithms, and protocols to apprehend a trustworthy network infrastructure....
J. Indumathi, G. V. Uma
ISSRE
2010
IEEE
13 years 7 months ago
Automata-Based Verification of Security Requirements of Composite Web Services
— With the increasing reliance of complex real-world applications on composite web services assembled from independently developed component services, there is a growing need for...
Hongyu Sun, Samik Basu, Vasant Honavar, Robyn R. L...