Sciweavers

BIS
2009
146views Business» more  BIS 2009»
13 years 2 months ago
Computer Support for Agile Human-to-Human Interactions with Social Protocols
Despite many works in CSCW, groupware, workflow systems and social networks, computer support for human-to-human interactions is still insufficient, especially support for agility,...
Willy Picard
BIS
2009
112views Business» more  BIS 2009»
13 years 2 months ago
Ontological Mapping of Information Security Best-Practice Guidelines
Abstract. Due to a rapid growth in the use of electronic data processing and networking, an information security management system with a holistic and widespread view becomes more ...
Stefan Fenz, Thomas Pruckner, Arman Manutscheri
WINSYS
2010
138views Business» more  WINSYS 2010»
13 years 2 months ago
Effect of Rainfall on Link Quality in an Outdoor Forest Deployment
Andrew Markham, Niki Trigoni, Stephen A. Ellwood
SECRYPT
2010
132views Business» more  SECRYPT 2010»
13 years 2 months ago
Management of Security Policies in Virtual Organisations
Benjamin Aziz, Alvaro Arenas, Ian Johnson, Matej A...
SECRYPT
2010
132views Business» more  SECRYPT 2010»
13 years 2 months ago
Efficient Algorithmic Safety Analysis of HRU Security Models
Anja Fischer, Winfried E. Kühnhauser
SECRYPT
2010
121views Business» more  SECRYPT 2010»
13 years 2 months ago
Risk based Access Control with Uncertain and Time-dependent Sensitivity
John A. Clark, Juan E. Tapiador, John A. McDermid,...
SECRYPT
2010
238views Business» more  SECRYPT 2010»
13 years 2 months ago
QoS and Security in Energy-harvesting Wireless Sensor Networks
Antonio Vincenzo Taddeo, Marcello Mura, Alberto Fe...
SECRYPT
2010
147views Business» more  SECRYPT 2010»
13 years 2 months ago
Security Models for Heterogeneous Networking
Security for Next Generation Networks (NGNs) is an attractive topic for many research groups. The Y-Comm security group believes that a new security approach is needed to address t...
Glenford E. Mapp, Mahdi Aiash, Aboubaker Lasebae, ...