Sciweavers

2270 search results - page 139 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
DRM
2006
Springer
14 years 18 days ago
Towards a secure and interoperable DRM architecture
In this paper we look at the problem of interoperability of digital rights management (DRM) systems in home networks. We introduce an intermediate module called the Domain Interop...
Gelareh Taban, Alvaro A. Cárdenas, Virgil D...
DBSEC
1996
125views Database» more  DBSEC 1996»
13 years 10 months ago
A Framework for High Assurance Security of Distributed Objects
High assurance security is di cult to achieve in distributed computer systems and databases because of their complexity, non-determinism and inherent heterogeneity. The practical ...
John Hale, Jody Threet, Sujeet Shenoi
ECBS
2006
IEEE
122views Hardware» more  ECBS 2006»
14 years 3 months ago
Customer-oriented Development of Complex Distributed Systems
Complex and distributed systems are more and more common. Hardware is going from strength to strength and is embedded in high performance peer-to-peer networks mostly. The task of...
Ivonne Erfurth
WER
2005
Springer
14 years 2 months ago
Requirement Elicitation Based on Goals with Security and Privacy Policies in Electronic Commerce
This paper describes a method for requirements elicitation based on goals for electronic commerce systems in agreement with security and privacy polices of the site. The method in...
Simara Vieira da Rocha, Zair Abdelouahab, Eduardo ...
IEEEARES
2008
IEEE
14 years 3 months ago
On the Possibility of Small, Service-Free Disk Based Storage Systems
For many storage providers, the cost of providing service calls exceeds the costs of the hardware being serviced. In this paper, we show that zeromaintenance, small disk arrays ar...
Jehan-François Pâris, Thomas J. E. Sc...