Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
12637
search results - page 87 / 2528
»
Security for Extensible Systems
Sort
relevance
views
votes
recent
update
View
thumb
title
85
Voted
ISPEC
2009
Springer
107
views
Security Privacy
»
more
ISPEC 2009
»
An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems
15 years 9 months ago
Download
cs.gmu.edu
Ruishan Zhang, Xinyuan Wang, Xiaohui Yang, Ryan Fa...
claim paper
Read More »
122
click to vote
CSFW
2003
IEEE
101
views
Security Privacy
»
more
CSFW 2003
»
A Derivation System for Security Protocols and its Logical Formalization
15 years 7 months ago
Download
www.andrew.cmu.edu
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...
claim paper
Read More »
81
Voted
ESORICS
1992
Springer
90
views
Security Privacy
»
more
ESORICS 1992
»
Towards Security in an Open Systems Federation
15 years 6 months ago
Download
groups.csail.mit.edu
John A. Bull, Li Gong, Karen R. Sollins
claim paper
Read More »
109
click to vote
CCS
2001
ACM
143
views
Security Privacy
»
more
CCS 2001
»
A Chinese wall security model for decentralized workflow systems
15 years 6 months ago
Download
cimic.rutgers.edu
Keywords
Vijayalakshmi Atluri, Soon Ae Chun, Pietro Mazzole...
claim paper
Read More »
128
Voted
WOSS
2004
ACM
129
views
Software Engineering
»
more
WOSS 2004
»
An extensible framework for autonomic analysis and improvement of distributed deployment architectures
15 years 8 months ago
Download
cs.gmu.edu
A distributed software system’s deployment architecture can have a significant impact on the system’s properties, which depend on various system parameters, such as network ba...
Sam Malek, Marija Mikic-Rakic, Nenad Medvidovic
claim paper
Read More »
« Prev
« First
page 87 / 2528
Last »
Next »