Sciweavers

495 search results - page 60 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
AICT
2007
IEEE
122views Communications» more  AICT 2007»
13 years 11 months ago
Towards Security Analyses of an Identity Federation Protocol for Web Services in Convergent Networks
— We describe a formal approach to the analysis of security aspects of an identity federation protocol for web services in convergent networks. This network protocol was proposed...
Maurice H. ter Beek, Corrado Moiso, Marinella Petr...
SDM
2008
SIAM
135views Data Mining» more  SDM 2008»
13 years 11 months ago
Preemptive Measures against Malicious Party in Privacy-Preserving Data Mining
Currently, many privacy-preserving data mining (PPDM) algorithms assume the semi-honest model and/or malicious model of multi-party interaction. However, both models are far from ...
Shuguo Han, Wee Keong Ng
RULEML
2009
Springer
14 years 4 months ago
Correlating Business Events for Event-Triggered Rules
Abstract. Event processing rules may be prescribed in many different ways, including by finite state machines, graphical methods, ECA (event-conditionaction) rules or reactive rule...
Josef Schiefer, Hannes Obweger, Martin Suntinger
BPM
2007
Springer
152views Business» more  BPM 2007»
13 years 11 months ago
Behavioral Constraints for Services
Recently, we introduced the concept of an operating guideline of a service as a structure that characterizes all its properly interacting partner services. The hitherto considered ...
Niels Lohmann, Peter Massuthe, Karsten Wolf
ICASSP
2011
IEEE
13 years 1 months ago
A fully automated 2-DE gel image analysis pipeline for high throughput proteomics
Image analysis is still considered as the bottleneck in 2D-gel based expression proteomics analysis for biomarkers discovery. We are presenting a new end-to-end image analysis pip...
Panagiotis Tsakanikas, Elias S. Manolakos