Sciweavers

4511 search results - page 43 / 903
» Observation Based System Security
Sort
View
137
Voted
CCGRID
2003
IEEE
15 years 8 months ago
A-peer: An Agent Platform Integrating Peer-to-Peer Network
Peer-to-Peer (p2p), as an emerging technology, is exerting huge influence on various application scenarios. Meanwhile, agents, assisting applications in traditional paradigm with...
Tieyan Li, Zhi-Gang Zhao, Si-Zhen Yo
110
Voted
ESSOS
2009
Springer
15 years 6 months ago
Pattern-Based Confidentiality-Preserving Refinement
Abstract. We present an approach to security requirements engineering, which makes use of special kinds of problem frames that serve to structure, characterize, analyze, and solve ...
Holger Schmidt
122
Voted
ACNS
2006
Springer
112views Cryptology» more  ACNS 2006»
15 years 8 months ago
Password Based Server Aided Key Exchange
We propose a new password-based 3-party protocol with a formal security proof in the standard model. Under reasonable assumptions we show that our new protocol is more efficient t...
Yvonne Cliff, Yiu Shing Terry Tin, Colin Boyd
130
Voted
ACSAC
2004
IEEE
15 years 6 months ago
PEACE: A Policy-Based Establishment of Ad-hoc Communities
Ad-hoc networks are perceived as communities of autonomous devices that interconnect with each other. Typically, they have dynamic topologies and cannot rely on a continuous conne...
Sye Loong Keoh, Emil Lupu, Morris Sloman
132
Voted
LADC
2007
Springer
15 years 8 months ago
Security Patterns and Secure Systems Design
Analysis and design patterns are well established as a convenient and reusable way to build high-quality object-oriented software. Patterns combine experience and good practices t...
Eduardo B. Fernández