Sciweavers

2632 search results - page 121 / 527
» Management Issues in Eda
Sort
View
GLOBECOM
2007
IEEE
15 years 10 months ago
A Hash Function Scheme for Key Management in UMTS MBMS
—3GPP 33.246 proposes Key Management Mechanism (KMM) to distribute security keys for Universal Mobile Telecommunications System (UMTS) Multimedia Broadcast and Multicast Service ...
Shin-Ming Cheng, Wei-Ru Lai, Phone Lin
ICC
2007
IEEE
111views Communications» more  ICC 2007»
15 years 10 months ago
SecureRank: A Risk-Based Vulnerability Management Scheme for Computing Infrastructures
— In this paper, we introduce a new scheme called SecureRank for prioritizing vulnerabilities to patch in computing systems/networks. This has become a key issue for IT infrastru...
Reiko Ann Miura-Ko, Nicholas Bambos
ICEBE
2007
IEEE
158views Business» more  ICEBE 2007»
15 years 10 months ago
The Design of A Rule-based and Event-driven Trust Management Framework
In both E-Commerce (EC) and Service-Oriented Computing (SOC) environments, sellers or service providers interact with customers or service clients for services or transactions. Fr...
Yan Wang 0002, Duncan S. Wong, Kwei-Jay Lin, Vijay...
SASO
2007
IEEE
15 years 10 months ago
STORM: A Secure Overlay for P2P Reputation Management
A fundamental problem that confronts decentralized reputation systems is the design of efficient, secure and incentive-compatible mechanisms to gather trust information despite m...
Aina Ravoaja, Emmanuelle Anceaume
HICSS
2006
IEEE
121views Biometrics» more  HICSS 2006»
15 years 10 months ago
E-Government: The Need for Effective Process Management in the Public Sector
The concept of e-government has evolved from the domain of e-business where enterprises need to collaborate with partners, suppliers and customers for the effective delivery of e-...
Vishanth Weerakkody, Simon Baire, Jyoti Choudrie