Sciweavers

5475 search results - page 43 / 1095
» Model Driven Security
Sort
View
ACISP
2010
Springer
13 years 11 months ago
The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key
Jun Shao, Min Feng, Bin Zhu, Zhenfu Cao, Peng Liu
EDBTW
2010
Springer
14 years 3 months ago
ODBIS: towards a platform for on-demand business intelligence services
In recent years, Software-as-a-Service (SaaS) is gaining momentum with more and more successful adoptions. Several companies including some well known names have embraced this new...
Moez Essaidi
ASIASIM
2004
Springer
14 years 3 months ago
Simulating Cyber-intrusion Using Ordered UML Model-Based Scenarios
Abstract. Network security simulator is required for the study on the cyber intrusion and defense as cyber terrors have been increasingly popular. Until now, network security simul...
Eung Ki Park, Joo Beom Yun, Hoh Peter In
OOPSLA
2009
Springer
14 years 4 months ago
The 9th OOPSLA workshop on domain-specific modeling
Juha-Pekka Tolvanen, Jeff Gray, Matti Rossi, Jonat...
IEEEARES
2007
IEEE
14 years 4 months ago
On Programming Models for Service-Level High Availability
Christian Engelmann, Stephen L. Scott, Chokchai Le...