Sciweavers

2429 search results - page 78 / 486
» Using Aspects to Design a Secure System
Sort
View
INFOCOM
2010
IEEE
13 years 7 months ago
Castor: Scalable Secure Routing for Ad Hoc Networks
—Wireless ad hoc networks are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have b...
Wojciech Galuba, Panos Papadimitratos, Marcin Potu...
MSS
2007
IEEE
129views Hardware» more  MSS 2007»
14 years 3 months ago
Cryptographic Security for a High-Performance Distributed File System
Storage systems are increasingly subject to attacks. Cryptographic file systems mitigate the danger of exposing data by using encryption and integrity protection methods and guar...
Roman Pletka, Christian Cachin
WSC
2004
13 years 10 months ago
A Template-Based Conceptual Modeling Infrastructure for Simulation of Physical Security Systems
Although simulation is one of the most innovative and cost-effective tools for modeling and analyzing a system, simulation studies often fail to provide any useful results. One re...
Ashu Guru, Paul A. Savory
PDC
2004
ACM
14 years 2 months ago
The impact of participation in information system design: a comparison of contextual placements
To compare the outcomes of participatory and user-centered contextual design, case study methods and the Activity Checklist derived from Activity Theory are used to analyze two sy...
Magnus Irestig, Henrik Eriksson, Toomas Timpka
EGOV
2007
Springer
14 years 3 months ago
A Trust-Centered Approach for Building E-Voting Systems
eVoting is a challenging approach for increasing eParticipation. However, lack of citizens’ trust seems to be a main obstacle that hinders its successful realization. In this pap...
Athanasios Antoniou, C. Korakas, Christos Manolopo...