Sciweavers

5722 search results - page 61 / 1145
» Security Function Interactions
Sort
View
ESORICS
2008
Springer
13 years 10 months ago
Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs
Key agreement is a fundamental security functionality by which pairs of nodes agree on shared keys to be used for protecting their pairwise communications. In this work we study k...
Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal R...
RE
2005
Springer
14 years 2 months ago
ST-Tool: A CASE Tool for Security Requirements Engineering
Security Requirements Engineering is emerging as a branch of Software Engineering, spurred by the realization that security must be dealt with early on during the requirements pha...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...
CSREASAM
2003
13 years 10 months ago
Securing FIPA Agent Communication
— The agent paradigm has been the subject of much research during the last decade. Recently, security of multiagent systems has gained increased attention. In this paper we consi...
Niklas Borselius, Chris J. Mitchell
SOUPS
2009
ACM
14 years 3 months ago
Ubiquitous systems and the family: thoughts about the networked home
Developments in ubiquitous and pervasive computing herald a future in which computation is embedded into our daily lives. Such a vision raises important questions about how people...
Linda Little, Elizabeth Sillence, Pamela Briggs
AGENTS
2000
Springer
14 years 1 months ago
Adaptive Trust and Co-operation: An Agent-Based Simulation Approach
This paper extends earlier work in the use of ‘Agent-based Computational Economics’ (ACE) for modelling the development of co-operation between firms. Inter-firm relations hav...
Bart Nooteboom, Tomas Klos, René J. Jorna