Sciweavers

1795 search results - page 110 / 359
» Security Models and Information Flow
Sort
View
155
Voted
NTMS
2009
IEEE
15 years 10 months ago
Q-ESP: A QoS-Compliant Security Protocol to Enrich IPSec Framework
—IPSec is a protocol that allows to make secure connections between branch offices and allows secure VPN accesses. However, the efforts to improve IPSec are still under way; one ...
Mahmoud Mostafa, Anas Abou El Kalam, Christian Fra...
138
Voted
IJACTAICIT
2010
176views more  IJACTAICIT 2010»
15 years 1 months ago
A Secured Web Services Based E-Commerce Model for SMME Using Digital Identity
This paper deals with redesigning the existing e-commerce architecture that has provided a platform for the large companies to sell their products so that it can provide a place o...
Ashwin B. K., Kumaran K., Madhu Vishwanatham V., M...
228
Voted
CSE
2009
IEEE
15 years 10 months ago
Solutions to Security and Privacy Issues in Mobile Social Networking
—Social network information is now being used in ways for which it may have not been originally intended. In particular, increased use of smartphones capable of running applicati...
Aaron Beach, Mike Gartrell, Richard Han
151
Voted
COOPIS
2000
IEEE
15 years 7 months ago
Workflow Modeling Using Proclets
The focus of traditional workflow management systems is on control flow within one process definition, that describes how a single case (i.e., workflow instance) is handled in isol...
Wil M. P. van der Aalst, Paulo Barthelmess, Claren...
156
Voted
ECCV
1992
Springer
16 years 5 months ago
Hierarchical Model-Based Motion Estimation
This paper describesa hierarchicalestimation framework for the computation of diverserepresentationsof motion information. The key features of the resulting framework (or family of...
James R. Bergen, P. Anandan, Keith J. Hanna, Rajes...