Sciweavers

2270 search results - page 287 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
154
Voted
BPM
2003
Springer
102views Business» more  BPM 2003»
15 years 9 months ago
A Process-Oriented Model for Authentication on the Basis of a Coloured Petri Net
Abstract. Public-key cryptography is a prerequisite for security in distributed systems and for reliable electronic commerce. The protection of public keys against attacks is the A...
Peter Lory
ICAS
2006
IEEE
145views Robotics» more  ICAS 2006»
15 years 10 months ago
A Model-Driven Development Framework for Non-Functional Aspects in Service Oriented Grids
Service-oriented grids are grid computing systems built with the notion of service-oriented architecture (SOA). Using two maract concepts, services and connections between service...
Hiroshi Wada, Junichi Suzuki, Katsuya Oba
150
Voted
VLDB
1993
ACM
73views Database» more  VLDB 1993»
15 years 8 months ago
A Model of Methods Access Authorization in Object-oriented Databases
Object-oriented databases are a recent and important development and many studies of them have been performed. These consider aspects such as data modeling, query languages, perfo...
Nurit Gal-Oz, Ehud Gudes, Eduardo B. Fernán...
ICIP
2006
IEEE
16 years 6 months ago
A Model for the Electronic Representation of Bank Checks
The substitution of physical bank check exchange by electronic check image transfer brings agility, security and cost reduction to the clearing system. In this paper, we propose a...
Danilo Dias, Ricardo L. de Queiroz
169
Voted
CANS
2009
Springer
276views Cryptology» more  CANS 2009»
15 years 2 months ago
Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model
Group signatures allow users to anonymously sign messages in the name of a group. Membership revocation has always been a critical issue in such systems. In 2004, Boneh and Shacham...
Benoît Libert, Damien Vergnaud