Sciweavers

2337 search results - page 370 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
ATAL
2003
Springer
14 years 2 months ago
Role-assignment in open agent societies
Open systems are characterized by heterogeneous participants which can enter or leave the system at will. Typical examples are e-commerce applications or information agent systems...
Mehdi Dastani, Virginia Dignum, Frank Dignum
OHS
2001
Springer
14 years 1 months ago
XAHM: An XML-Based Adaptive Hypermedia Model and Its Implementation
This paper presents an XML-based Adaptive Hypermedia Model (XAHM) and its modular architecture, for modelling and supporting Adaptive Hypermedia Systems, i.e. hypertext-based multi...
Mario Cannataro, Andrea Pugliese
HICSS
2000
IEEE
133views Biometrics» more  HICSS 2000»
14 years 1 months ago
Value based Requirements Creation for Electronic Commerce Applications
Electronic commerce applications have special features compared to conventional information systems. First, because electronic commerce usually involves yet nonexisting business a...
Jaap Gordijn, Hans Akkermans, Hans van Vliet
CF
2004
ACM
14 years 2 months ago
Repairing return address stack for buffer overflow protection
Although many defense mechanisms against buffer overflow attacks have been proposed, buffer overflow vulnerability in software is still one of the most prevalent vulnerabilities e...
Yong-Joon Park, Gyungho Lee
SOSP
2007
ACM
14 years 5 months ago
VirtualPower: coordinated power management in virtualized enterprise systems
Power management has become increasingly necessary in large-scale datacenters to address costs and limitations in cooling or power delivery. This paper explores how to integrate p...
Ripal Nathuji, Karsten Schwan