Sciweavers

BIS
2009
146views Business» more  BIS 2009»
13 years 10 months ago
Computer Support for Agile Human-to-Human Interactions with Social Protocols
Despite many works in CSCW, groupware, workflow systems and social networks, computer support for human-to-human interactions is still insufficient, especially support for agility,...
Willy Picard
BIS
2009
112views Business» more  BIS 2009»
13 years 10 months ago
Ontological Mapping of Information Security Best-Practice Guidelines
Abstract. Due to a rapid growth in the use of electronic data processing and networking, an information security management system with a holistic and widespread view becomes more ...
Stefan Fenz, Thomas Pruckner, Arman Manutscheri
WINSYS
2010
138views Business» more  WINSYS 2010»
13 years 10 months ago
Effect of Rainfall on Link Quality in an Outdoor Forest Deployment
Andrew Markham, Niki Trigoni, Stephen A. Ellwood
SECRYPT
2010
132views Business» more  SECRYPT 2010»
13 years 10 months ago
Management of Security Policies in Virtual Organisations
Benjamin Aziz, Alvaro Arenas, Ian Johnson, Matej A...
SECRYPT
2010
132views Business» more  SECRYPT 2010»
13 years 10 months ago
Efficient Algorithmic Safety Analysis of HRU Security Models
Anja Fischer, Winfried E. Kühnhauser
SECRYPT
2010
121views Business» more  SECRYPT 2010»
13 years 10 months ago
Risk based Access Control with Uncertain and Time-dependent Sensitivity
John A. Clark, Juan E. Tapiador, John A. McDermid,...
SECRYPT
2010
238views Business» more  SECRYPT 2010»
13 years 10 months ago
QoS and Security in Energy-harvesting Wireless Sensor Networks
Antonio Vincenzo Taddeo, Marcello Mura, Alberto Fe...
SECRYPT
2010
147views Business» more  SECRYPT 2010»
13 years 10 months ago
Security Models for Heterogeneous Networking
Security for Next Generation Networks (NGNs) is an attractive topic for many research groups. The Y-Comm security group believes that a new security approach is needed to address t...
Glenford E. Mapp, Mahdi Aiash, Aboubaker Lasebae, ...