Sciweavers

410 search results - page 30 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
PKC
1999
Springer
91views Cryptology» more  PKC 1999»
13 years 12 months ago
A Secure Pay-per View Scheme for Web-Based Video Service
With the development of high speed computer networks, video service on the Web has huge market potential in that the video service can be provided to subscribers with greater time ...
Jianying Zhou, Kwok-Yan Lam
SIGADA
2004
Springer
14 years 1 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
JORS
2011
62views more  JORS 2011»
12 years 10 months ago
Cost allocation in the establishment of a collaborative transportation agreement - an application in the furniture industry
: Transportation is an important part of the Canadian furniture industry supply chain. Even though there are often several manufacturers shipping in the same market region, coordin...
Jean-François Audy, Sophie D'Amours, L.-M. ...
BMCBI
2008
112views more  BMCBI 2008»
13 years 7 months ago
A general modeling and visualization tool for comparing different members of a group: application to studying tau-mediated regul
Background: Innumerable biological investigations require comparing collections of molecules, cells or organisms to one another with respect to one or more of their properties. Al...
Arnab Bhattacharya, Sasha Levy, Adria LeBoeuf, Mic...
IEEEARES
2007
IEEE
14 years 1 months ago
Static evaluation of Certificate Policies for GRID PKIs interoperability
Validating an end-entity X.509 digital certificate prior to authorizing it for using a resource into the computational Grid has become a widely studied topic due to its importance...
Valentina Casola, Nicola Mazzocca, Jesus Luna, Osc...