Sciweavers

1770 search results - page 51 / 354
» Writing requirements in computer security
Sort
View
NSPW
2004
ACM
14 years 1 months ago
A collaborative approach to autonomic security protocols
This paper considers a new security protocol paradigm whereby principals negotiate and on-the-fly generate security protocols according to their needs. When principals wish to in...
Hongbin Zhou, Simon N. Foley
IEEEARES
2008
IEEE
14 years 2 months ago
Context Ontology for Secure Interoperability
During interoperability exchanges, organizations are jointly conducting computation and sharing tasks. However, organizations can have different security policies. To guarantee g...
Céline Coma, Nora Cuppens-Boulahia, Fr&eacu...
CSCW
2010
ACM
14 years 2 months ago
The roles that make the domestic work
This paper builds on earlier CSCW studies of domestic technologies, looking at the frequent maintenance required by new security technologies that households are adopting to provi...
Jennifer A. Rode
SUTC
2008
IEEE
14 years 2 months ago
Security Enforcement Model for Distributed Usage Control
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu
CLUSTER
2002
IEEE
14 years 20 days ago
A New Architecture for Secure Carrier-Class Clusters
Traditionally, the telecom industry has used clusters to meet its carrier-class requirements of high availability, reliability, and scalability, while relying on cost-effective ha...
Makan Pourzandi, Ibrahim Haddad, Charles Levert, M...