Sciweavers

258 search results - page 22 / 52
» Portable secure identity management for software engineering
Sort
View
IJISEC
2007
119views more  IJISEC 2007»
13 years 8 months ago
An incentive compatible reputation mechanism for ubiquitous computing environments
The vision of ubiquitous computing is becoming a reality thanks to the advent of portable devices and the advances in wireless networking technologies. It aims to facilitate user ...
Jinshan Liu, Valérie Issarny
CISSE
2008
Springer
13 years 10 months ago
Anonymity Leakage Reduction in Network Latency
Each Internet communication leaves trails here or there, that can be followed back to the user. Notably, anonymous communication schemes are purposed to hide users' identity ...
Longy O. Anyanwu, Jared Keengwe, Gladys A. Arome
CAISE
2006
Springer
14 years 6 days ago
Designing Security Requirements Models Through Planning
The quest for designing secure and trusted software has led to refined Software Engineering methodologies that rely on tools to support the design process. Automated reasoning mech...
Volha Bryl, Fabio Massacci, John Mylopoulos, Nicol...
ICSE
2007
IEEE-ACM
14 years 8 months ago
When Role Models Have Flaws: Static Validation of Enterprise Security Policies
Modern multiuser software systems have adopted RoleBased Access Control (RBAC) for authorization management. This paper presents a formal model for RBAC policy validation and a st...
Marco Pistoia, Stephen J. Fink, Robert J. Flynn, E...
IEEESCC
2008
IEEE
14 years 2 months ago
Built-to-Order Service Engineering for Enterprise IT Discovery
Enterprise IT environments are complex: business applications rely on distributed middleware running on diverse hardware with components depending on each other in many unexpected...
Nikolai Joukov, Murthy V. Devarakonda, Kostas Mago...