Sciweavers

134 search results - page 17 / 27
» Requirements Modeling with the Aspect-oriented User Requirem...
Sort
View
PKC
2009
Springer
166views Cryptology» more  PKC 2009»
14 years 8 months ago
Security of Blind Signatures under Aborts
We explore the security of blind signatures under aborts where the user or the signer may stop the interactive signature issue protocol prematurely. Several works on blind signatur...
Dominique Schröder, Marc Fischlin
SERA
2010
Springer
13 years 5 months ago
A UML Based Deployment and Management Modeling for Cooperative and Distributed Applications
Thanks to the major evolutions in the communication technologies and in order to deal with a continuous increase in systems complexity, current applications have to cooperate to ac...
Mohammed Nadhmi Miladi, Fatma Krichen, Mohamed Jma...
CBMS
2008
IEEE
14 years 1 months ago
Behavior-Based Access Control for Distributed Healthcare Environment
Privacy and security are critical requirements for using patient profiles in distributed healthcare environments. The amalgamation of new information technology with traditional ...
Mohammad H. Yarmand, Kamran Sartipi, Douglas G. Do...
WSC
2000
13 years 8 months ago
Productivity modeling of semiconductor manufacturing equipment
Optimizing a semiconductor wafer fab requires balancing technology and productivity. Recent work on productivity modeling will be described and focus on discrete event simulation ...
Mark Pool, Robert Bachrach
ACMDIS
2000
ACM
13 years 12 months ago
Rapid Ethnography: Time Deepening Strategies for HCI Field Research
Field research methods are useful in the many aspects of HumanComputer Interaction research, including gathering user requirements, understanding and developing user models, and n...
David R. Millen