Sciweavers

434 search results - page 87 / 87
» Addressing IT Security for Critical Control Systems
Sort
View
ER
2004
Springer
169views Database» more  ER 2004»
13 years 10 months ago
Intentional Modeling to Support Identity Management
Identity management has arisen as a major and urgent challenge for internet-based communications and information services. Internet services involve complex networks of relationshi...
Lin Liu, Eric S. K. Yu
ECBS
2000
IEEE
87views Hardware» more  ECBS 2000»
13 years 9 months ago
Limited Software Warranties
Because there are di erent types of software (e.g., language, application, target environment, etc.), di erent software certi cation methodologies are needed. Software process imp...
Jeffrey M. Voas
COMCOM
2006
121views more  COMCOM 2006»
13 years 4 months ago
Interactive Transparent Networking: Protocol meta modeling based on EFSM
the extensibility and evolution of network services and protocols had become a major research issue in recent years. The 'programmable' and 'active' network par...
Javed I. Khan, Raid Zaghal
PRL
2007
287views more  PRL 2007»
13 years 4 months ago
2D and 3D face recognition: A survey
Government agencies are investing a considerable amount of resources into improving security systems as result of recent terrorist events that dangerously exposed flaws and weakn...
Andrea F. Abate, Michele Nappi, Daniel Riccio, Gab...