Sciweavers

1770 search results - page 82 / 354
» Writing requirements in computer security
Sort
View
SWS
2004
ACM
14 years 2 months ago
Security in WebCom: addressing naming issues for a web services architecture
Supporting security in distributed systems is becoming more important with the ongoing work in grids, distributed middlewares and web services. Decentralised security architecture...
Thomas B. Quillinan, Simon N. Foley
WETICE
2000
IEEE
14 years 1 months ago
Reducing Software Security Risk through an Integrated Approach
This paper presents joint work by the California Institute of Technology’s Jet Propulsion Laboratory and the University of California at Davis (UC Davis) sponsored by the Nation...
David P. Gilliam, John C. Kelly, Matt Bishop
EUC
2007
Springer
14 years 3 months ago
Low-Cost and Strong-Security RFID Authentication Protocol
This paper proposes a low-cost and strong-security RFID protocol to reduce the computational load on both the back-end database and the tags in an RFID system. When desynchronizati...
JaeCheol Ha, Sang-Jae Moon, Juan Manuel Gonz&aacut...
HUC
2007
Springer
14 years 3 months ago
Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction
Spontaneous interaction is a desirable characteristic associated with mobile and ubiquitous computing. The aim is to enable users to connect their personal devices with devices en...
Rene Mayrhofer, Hans Gellersen, Mike Hazas
I3E
2003
133views Business» more  I3E 2003»
13 years 10 months ago
Inter-Organizational E-Services Accounting Management on Computational Grids
Abstract Accounting management is of strategic importance for a successful uptake of computational Grid technology within the user community. Computational Grid is one the most imp...
Franco Arcieri, Fabio Fioravanti, Enrico Nardelli,...