Sciweavers

2281 search results - page 6 / 457
» Security Patterns and Secure Systems Design
Sort
View
SOUPS
2009
ACM
14 years 3 months ago
A multi-method approach for user-centered design of identity management systems
Pooya Jaferian, David Botta, Kirstie Hawkey, Konst...
ACSAC
2008
IEEE
14 years 3 months ago
Privacy-Aware Biometrics: Design and Implementation of a Multimodal Verification System
Stelvio Cimato, Marco Gamassi, Vincenzo Piuri, Rob...
AGENTS
2001
Springer
14 years 1 months ago
Architectural design of a multi-agent system for handling metadata streams
Ï Ú × Ò ÑÙÐØ ¹ ÒØ Ö Ø ØÙÖ ØÓ Ð Ú Ö Ñ Ø ¹ Ø ×ØÖ Ñ× ×ÝÒ ÖÓÒÓÙ×ÐÝ Û Ø ÑÙÐØ Ñ ×ØÖ Ñ× ÓÚ Ö Û ¹ Ö Ò ØÛÓÖ º ÌÓ Ø × Ò...
Don Cruickshank, Luc Moreau, David De Roure
SAFECOMP
2001
Springer
14 years 29 days ago
About the Design of Distributed Control Systems: The Quasi-Synchronous Approach
Paul Caspi, Christine Mazuet, Natacha Reynaud Pali...