Sciweavers

123 search results - page 6 / 25
» Patterns for Automated Management of Security and Dependabil...
Sort
View
CCS
2005
ACM
14 years 7 days ago
Automated trust negotiation using cryptographic credentials
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Be...
Jiangtao Li, Ninghui Li, William H. Winsborough
OOPSLA
1997
Springer
13 years 11 months ago
Composite Design Patterns
ed Abstract Factory is yet another. When patterns cooperate, the cooperation itself can give rise to problems, contexts, trade-offs, and consequences. For instance, should a Visito...
Dirk Riehle
KBS
2000
122views more  KBS 2000»
13 years 6 months ago
Creating knowledge maps by exploiting dependent relationships
Knowledge is an interesting concept that has attracted the attention of philosophers for thousands of years. In more recent times, researchers have investigated knowledge in a mor...
John L. Gordon
IH
1999
Springer
13 years 11 months ago
Attacks on Steganographic Systems
The majority of steganographic utilities for the camouflage of confidential communication suffers from fundamental weaknesses. On the way to more secure steganographic algorithm...
Andreas Westfeld, Andreas Pfitzmann
BPM
2008
Springer
109views Business» more  BPM 2008»
13 years 8 months ago
Automating Knowledge Transfer and Creation in Knowledge Intensive Business Processes
It is a well known fact that a wealth of knowledge relies in the employees which makes them one of the most or even the most valuable asset of organisations. But often this knowled...
Michael Granitzer, Gisela Granitzer, Klaus Tochter...