Sciweavers

2270 search results - page 154 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
SRDS
2007
IEEE
15 years 9 months ago
Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage
We are witnessing a revival of Storage Service Providers in the form of new vendors as well as traditional players. While storage outsourcing is cost-effective, many companies are...
Vishal Kher, Yongdae Kim
128
Voted
UML
2005
Springer
15 years 9 months ago
Performance Analysis of UML Models Using Aspect-Oriented Modeling Techniques
Abstract. Aspect-Oriented Modeling (AOM) techniques allow software designers to isolate and address separately solutions for crosscutting concerns (such as security, reliability, n...
Hui Shen, Dorina C. Petriu
143
Voted
TIT
2011
125views more  TIT 2011»
14 years 10 months ago
Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
Abstract. In 1998, Blaze, Bleumer, and Strauss proposed a cryptographic primitive called proxy re-encryption, in which a proxy transforms – without seeing the corresponding plain...
Benoît Libert, Damien Vergnaud
177
Voted
WOA
2010
15 years 1 months ago
Using Mobile Agents for Secure Biometric Authentication
This paper deals with the definition of a strong authentication model, coupling usual password/PIN based methods with a biometric matching, over a Multi Agent distributed infrastru...
Marco Tranquillin, Carlo Ferrari, Michele Moro
118
Voted
COSIT
2005
Springer
106views GIS» more  COSIT 2005»
15 years 9 months ago
Investigating the Need for Eliminatory Constraints in the User Interface of Bicycle Route Planners
According to choice models in economics, consumer choice can be modeled as a two-stage process, starting with the choice of feasible alternatives, called the screening process, fol...
Hartwig H. Hochmair, Claus Rinner