Sciweavers

31 search results - page 4 / 7
» ieeeares 2009
Sort
View
IEEEARES
2009
IEEE
14 years 1 months ago
Accuracy: The Fundamental Requirement for Voting Systems
—There have been several attempts to develop a comprehensive account of the requirements for voting systems, particularly for public elections. Typically, these approaches identi...
Tim Storer, Russell Lock
IEEEARES
2009
IEEE
14 years 1 months ago
Measuring Voter-Controlled Privacy
—In voting, the notion of receipt-freeness has been proposed to express that a voter cannot gain any information to prove that she has voted in a certain way. It aims to prevent ...
Hugo L. Jonker, Sjouke Mauw, Jun Pang
IEEEARES
2009
IEEE
14 years 1 months ago
Enhancing Control of Service Compositions in Service-Oriented Architectures
In a service-oriented architecture, service compositions are assembled from other component services. Such compositions may include services from unknown and potentially untrusted...
Christian Schneider, Frederic Stumpf, Claudia Ecke...
IEEEARES
2009
IEEE
14 years 1 months ago
Investigating the Implications of Virtual Machine Introspection for Digital Forensics
— Researchers and practitioners in computer forensics currently must base their analysis on information that is either incomplete or produced by tools that may themselves be comp...
Kara L. Nance, Brian Hay, Matt Bishop
IEEEARES
2010
IEEE
14 years 1 months ago
Solving the Transitive Access Problem for the Services Oriented Architecture
: © Solving the Transitive Access Problem for the Services Oriented Architecture Alan H. Karp, Jun Li HP Laboratories HPL-2008-204R1 SOA, web services, access control, RBAC, PBAC,...
Alan H. Karp, Jun Li