Sciweavers

6137 search results - page 179 / 1228
» Securing Collaborative Applications
Sort
View
CCS
2008
ACM
14 years 7 days ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...
ICDCSW
2005
IEEE
14 years 3 months ago
Increasing Attack Resiliency of Wireless Ad Hoc and Sensor Networks
An ad hoc or sensor network that is employed for security sensitive applications is expected to tolerate a certain quantity of maliciously behaving nodes. Algorithms must be desig...
Harald Vogt
SAC
2009
ACM
14 years 2 months ago
A taxonomy and adversarial model for attacks against network log anonymization
In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have be...
Justin King, Kiran Lakkaraju, Adam J. Slagell
OOPSLA
2007
Springer
14 years 4 months ago
Notation and representation in collaborative object-oriented design: an observational study
Software designers in the object-oriented paradigm can make use of modeling tools and standard notations such as UML. Nevertheless, casual observations from collocated design coll...
Uri Dekel, James D. Herbsleb
MC
2008
139views Computer Science» more  MC 2008»
13 years 11 months ago
Combining Web 2.0 and Collaboration Support Systems
In the current discussion of the impact Web 2.0 may have on CSCW and Groupware research, Web 2.0 applications are often considered to be a substitute for Collaboration Support Sys...
Michael Prilla, Carsten Ritterskamp