Sciweavers

2270 search results - page 104 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
IJWIS
2007
153views more  IJWIS 2007»
13 years 8 months ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...
CBMS
2003
IEEE
14 years 2 months ago
Localizing Contour Points for Indexing an X-Ray Image Retrieval System
Vertebra shape can effectively describe various pathologies found in spine x-ray images. There are some critical regions on the shape contour which help determine whether the shap...
Xiaoqian Xu, D. J. Lee, Sameer Antani, L. Rodney L...
SP
1997
IEEE
106views Security Privacy» more  SP 1997»
14 years 1 months ago
Secure Software Architectures
The computer industry is increasingly dependent on open architectural standards for their competitive success. This paper describes a new approach to secure system design in which...
Mark Moriconi, Xiaolei Qian, Robert A. Riemenschne...
HICSS
2002
IEEE
140views Biometrics» more  HICSS 2002»
14 years 1 months ago
Intelligent Student Profiling with Fuzzy Models
Traditional Web-based educational systems still have several shortcomings when comparing with a real-life classroom teaching, such as lack of contextual and adaptive support, lack...
Dongming Xu, Huaiqing Wang, Kaile Su
ISPEC
2007
Springer
14 years 3 months ago
Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems
Considerable research and experiment results in recent years have shown that the server-proxy-user architecture represents an efficient and scalable new paradigm for multimedia con...
Robert H. Deng, Yanjiang Yang