Sciweavers

2270 search results - page 124 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
DSONLINE
2006
79views more  DSONLINE 2006»
13 years 9 months ago
Integrating Security Policies via Container Portable Interceptors
In the past, it was very common to develop middleware without consideration of security from the very beginning. To integrate security, the middleware that should be protected has...
Tom Ritter, Rudolf Schreiner, Ulrich Lang
HICSS
2003
IEEE
153views Biometrics» more  HICSS 2003»
14 years 2 months ago
Balancing Safety Against Performance: Tradeoffs in Internet Security
All Internet-accessible computing systems are currently faced with incessant threats ranging from simple scriptkiddies to highly sophisticated criminal enterprises. In response to...
Vu A. Ha, David J. Musliner
HICSS
2006
IEEE
75views Biometrics» more  HICSS 2006»
14 years 2 months ago
Electronic Markets for Private Information: Economic and Security Considerations
Technological advances in the collection, storage and analysis of data have increased the ease with which businesses can make profitable use of information about individuals. Som...
Ram Gopal L., Robert S. Garfinkel, Manuel A. Nunez...
AAMAS
2011
Springer
13 years 4 months ago
Multi-agent role allocation: issues, approaches, and multiple perspectives
In cooperative multi-agent systems, roles are used as a design concept when creating large systems, they are known to facilitate specialization of agents, and they can help to redu...
Adam Campbell, Annie S. Wu
ECUMN
2007
Springer
14 years 3 months ago
Context-Sensitive Security Framework for Pervasive Environments
Pervasive systems enable us to have an overview of what digital environments will look like in the future. Opportunities given by pervasive systems, both in terms of applications ...
Charles-Eric Pigeot, Yann Gripay, Vasile-Marian Sc...