Sciweavers

2763 search results - page 121 / 553
» The Dangerous 'All' in Specifications
Sort
View
HICSS
2002
IEEE
90views Biometrics» more  HICSS 2002»
14 years 2 months ago
Legitimate by Design: Towards Trusted Virtual Community Environments
Legitimacy is a key part of the social requirements specification for a trusted virtual community environment (VCE). If an environment is not seen as legitimate, social conflicts m...
Brian Whitworth, Aldo de Moor
ADAEUROPE
2001
Springer
14 years 2 months ago
Building Formal Requirements Models for Reliable Software
Requirements engineering (RE) is concerned with the elicitation of the goals to be achieved by the system envisioned, the operationalization of such goals into specifications of se...
Axel van Lamsweerde
POLICY
2001
Springer
14 years 2 months ago
IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution
IPSec (Internet Security Protocol Suite) functions will be executed correctly only if its policies are correctly specified and configured. Manual IPSec policy configuration is inef...
Zhi Fu, Shyhtsun Felix Wu, He Huang, Kung Loh, Fen...
TOOLS
2000
IEEE
14 years 2 months ago
Design and Implementation of CORBA-Based Subscription Server
The standard CORBA operation invocation model supports synchronous, one-way, and deferred synchronous interactions between clients and servers. However, this model is too restrict...
R. Maheshwari, R. Fatoohi
ICDE
2010
IEEE
184views Database» more  ICDE 2010»
14 years 1 months ago
On optimal anonymization for l+-diversity
-- Publishing person specific data while protecting privacy is an important problem. Existing algorithms that enforce the privacy principle called l-diversity are heuristic based d...
Junqiang Liu, Ke Wang