Sciweavers

2270 search results - page 152 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
125
Voted
AISS
2010
93views more  AISS 2010»
15 years 1 months ago
Kindergarten-Family Collaboration Model (KFCM) to Support Raising Children
Kindergartens have been expected to take on a new role of child-raising support due to changes in the social environment such as declining birthrate and deregulation. A web page c...
Tomoya Kato
135
Voted
NSPW
2004
ACM
15 years 9 months ago
Support for multi-level security policies in DRM architectures
Digital rights management systems allow copyrighted content to be commercialized in digital format without the risk of revenue loss due to piracy. Making such systems secure is no...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
123
Voted
WICSA
2008
15 years 5 months ago
Towards a Formal Model for Reconfigurable Software Architectures by Bigraphs
With the spread of the Internet and software evolution in complex intensive systems, software architecture often need be reconfigured during runtime to adapt variable environments...
Zhiming Chang, XinJun Mao, Zhichang Qi
115
Voted
JMM2
2008
84views more  JMM2 2008»
15 years 3 months ago
A Localized and Secure Method for Transferring Bank Information by SMS for Persian Banks
Nowadays m-banking (mobile banking) is widely used in many banks. It has embarked upon supply of various services based on different systems and with the aid of various services su...
Mohammad Hassan Shirali-Shahreza, Mohammad Shirali...
146
Voted
AIR
2005
97views more  AIR 2005»
15 years 3 months ago
Explanation in Case-Based Reasoning-Perspectives and Goals
Abstract. We present an overview of different theories of explanation from the philosophy and cognitive science communities. Based on these theories, as well as models of explanati...
Frode Sørmo, Jörg Cassens, Agnar Aamod...