Sciweavers

2429 search results - page 105 / 486
» Using Aspects to Design a Secure System
Sort
View
IV
1999
IEEE
198views Visualization» more  IV 1999»
14 years 1 months ago
A Prototype Hotel Browsing System Using Java3D
Java3D is an application-centred approach to building 3D worlds. We use Java3D and VRML to design a prototype WWW-based 3D Hotel Browsing system. A Java3D scene graph viewer was i...
D. Ball, Majid Mirmehdi
QSIC
2005
IEEE
14 years 2 months ago
Systematic Incremental Development of Agent Systems, using Prometheus
This paper presents a mechanism for dividing an agent oriented application into the three IEEE defined scoping levels of essential, conditional and optional. This mechanism is ap...
Mikhail Perepletchikov, Lin Padgham
WS
2004
ACM
14 years 2 months ago
Security considerations for IEEE 802.15.4 networks
The IEEE 802.15.4 specification outlines a new class of wireless radios and protocols targeted at low power devices, personal area networks, and sensor nodes. The specification ...
Naveen Sastry, David Wagner
HICSS
2007
IEEE
97views Biometrics» more  HICSS 2007»
14 years 3 months ago
Implementation-Oriented Secure Architectures
We propose a framework for constructing secure systems at the architectural level. This framework is composed of an implementation-oriented formalization of a system’s architect...
Daniel Conte de Leon, Jim Alves-Foss, Paul W. Oman
ACISP
2003
Springer
14 years 2 months ago
A Taxonomy of Single Sign-On Systems
Abstract. At present, network users have to manage one set of authentication credentials (usually a username/password pair) for every service with which they are registered. Single...
Andreas Pashalidis, Chris J. Mitchell