Sciweavers

378 search results - page 57 / 76
» Security requirement analysis of business processes
Sort
View
SAC
2011
ACM
12 years 10 months ago
Cloud application logging for forensics
Logs are one of the most important pieces of analytical data in a cloud-based service infrastructure. At any point in time, service owners and operators need to understand the sta...
Raffael Marty
DOLAP
2010
ACM
13 years 5 months ago
Integrating OLAP and recommender systems: an evaluation perspective
The integration of OLAP with web-search technologies is a promising research topic. Recommender systems are popular web-search mechanisms, because they can address information ove...
Artus Krohn-Grimberghe, Alexandros Nanopoulos, Lar...
OR
2011
Springer
13 years 2 months ago
Modeling an e-government observatory for rural SMEs using UML with RUP
Developing Web-based systems for agriculture and rural development requires the collaboration of experts from different scientific fields and backgrounds. Thus, it is crucial to ...
Sotiris Karetsos, Nikos Manouselis, Constantina Co...
CCS
2011
ACM
12 years 7 months ago
MIDeA: a multi-parallel intrusion detection architecture
Network intrusion detection systems are faced with the challenge of identifying diverse attacks, in extremely high speed networks. For this reason, they must operate at multi-Giga...
Giorgos Vasiliadis, Michalis Polychronakis, Sotiri...
FC
2004
Springer
89views Cryptology» more  FC 2004»
14 years 1 months ago
Electronic National Lotteries
We describe the design and implementation of secure and robust protocol and system for a national electronic lottery. Electronic lotteries at a national level are a viable cost e...
Elisavet Konstantinou, Vasiliki Liagkou, Paul G. S...