Sciweavers

2270 search results - page 142 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
148
Voted
BCS
2008
15 years 5 months ago
Tools for Traceable Security Verification
Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work toward...
Jan Jürjens, Yijun Yu, Andreas Bauer 0002
132
Voted
EEMMAS
2007
Springer
15 years 9 months ago
Engineering Contextual Information for Pervasive Multiagent Systems
Multiagent systems for mobile and pervasive computing should extensively exploit contextual information both to adapt to user needs and to enable autonomic behavior. This raises th...
Gabriella Castelli, Marco Mamei, Franco Zambonelli
120
Voted
HICSS
2007
IEEE
117views Biometrics» more  HICSS 2007»
15 years 9 months ago
Offering Mobile Security as a Service
The objective of this paper is to study how a software product company can expand its productbased business with the Software as a Service (SaaS) model into the mobile setting. We...
Aki Lassila
142
Voted
COLCOM
2007
IEEE
15 years 7 months ago
Transparent security for collaborative environments
Current collaborative tools are often not able to profit from existing systems for user management. It is therefore necessary for collaborative systems to administrate their users ...
Eva Hladká, Daniel Kouril, Michal Proch&aac...
130
Voted
STORAGESS
2006
ACM
15 years 9 months ago
Long-term threats to secure archives
Archival storage systems are designed for a write-once, read-maybe usage model which places an emphasis on the long-term preservation of their data contents. In contrast to tradit...
Mark W. Storer, Kevin M. Greenan, Ethan L. Miller