Sciweavers

5722 search results - page 97 / 1145
» Security Function Interactions
Sort
View
SEKE
2004
Springer
14 years 2 months ago
Integrating Security Administration into Software Architectures Design
Software architecture plays a central role in developing software systems that satisfy functionality and security requirements. However, little has been done to integrate system d...
Huiqun Yu, Xudong He, Yi Deng, Lian Mo
SEC
1997
13 years 10 months ago
A formal model to aid documenting and harmonizing of information security requirements
A formal top down model shall be presented to aid documentation and harmonization of information security requirements. The model formalizes layered development of inn security, w...
Jussipekka Leiwo, Yuliang Zheng
ISI
2007
Springer
13 years 8 months ago
Privacy Preserving Collaborative Data Mining
Privacy-preserving data mining is an important issue in the areas of data mining and security. In this paper, we study how to conduct association rule mining, one of the core data...
Justin Z. Zhan
BMCBI
2010
119views more  BMCBI 2010»
13 years 9 months ago
Functional classification of proteins based on projection of amino acid sequences: application for prediction of protein kinase
Background: The knowledge about proteins with specific interaction capacity to the protein partners is very important for the modeling of cell signaling networks. However, the exp...
Boris Sobolev, Dmitry Filimonov, Alexey Lagunin, A...
ICN
2009
Springer
14 years 1 months ago
New Algorithm for the Design of Topology Aware Hypercube in Multi-hop Ad Hoc Networks
Securing group communications in resource constrained, infrastructure-less environments such as Mobile Ad Hoc Networks (MANETs) has become one of the most challenging research dire...
Maria Striki, Kyriakos Manousakis, John S. Baras