Sciweavers

80 search results - page 13 / 16
» ifip 2009
Sort
View
IFIP
2009
Springer
14 years 2 months ago
A Policy Model for Secure Information Flow
When a computer program requires legitimate access to confidential data, the question arises whether such a program may illegally reveal sensitive information. This paper proposes...
Adedayo Adetoye, Atta Badii
IFIP
2009
Springer
14 years 23 hour ago
Modeling Virtual Organization Architecture with the Virtual Organization Breeding Methodology
While Enterprise Architecture Modeling (EAM) methodologies become more and more popular, an EAM methodology tailored to the needs of virtual organizations (VO) is still to be devel...
Zbigniew Paszkiewicz, Willy Picard
IFIP
2009
Springer
13 years 5 months ago
Classifying Enterprise Architecture Analysis Approaches
Abstract. Enterprise architecture (EA) management forms a commonly accepted means to enhance the alignment of business and IT, and to support the managed evolution of the enterpris...
Sabine Buckl, Florian Matthes, Christian M. Schwed...
IFIP
2009
Springer
13 years 5 months ago
Finite Models in FOL-Based Crypto-Protocol Verification
Cryptographic protocols can only be secure under certain inequality assumptions. Axiomatizing these inequalities explicitly is problematic: stating too many inequalities may impair...
Jan Jürjens, Tjark Weber
IFIP
2009
Springer
14 years 2 months ago
Contextual Inquiry in Signal Boxes of a Railway Organization
A number of selected field-study techniques have been validated in a case study in the domain of railway signal boxes. The context of this work is the endeavour of a human-centred ...
Joke Van Kerckhoven, Sabine Geldof, Bart Vermeersc...