Sciweavers

786 search results - page 34 / 158
» A Software System for Secure Computer Aided Exams
Sort
View
OOPSLA
2007
Springer
15 years 6 months ago
Towards a framework for requirement change management in healthcare software applications
Requirements volatility is an issue in software development life cycle which often originated from our incomplete knowledge about the domain of interest. In this paper, we propose...
Arash Shaban-Nejad, Volker Haarslev
ISORC
2008
IEEE
15 years 6 months ago
MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems
In this paper, a Role-based Access Control (RBAC) model is applied and extended to a multimedia version called Multi-Role Based Access Control (MRBAC), which can fully support the...
Na Zhao, Min Chen, Shu-Ching Chen, Mei-Ling Shyu
SAC
2002
ACM
14 years 11 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
SBACPAD
2004
IEEE
93views Hardware» more  SBACPAD 2004»
15 years 1 months ago
FlowCert : Probabilistic Certification for Peer-to-Peer Computations
Large scale cluster, Peer-to-Peer computing systems and grid computer systems gather thousands of nodes for computing parallel applications. At this scale, it raises the problem o...
Sébastien Varrette, Jean-Louis Roch, Franck...
FTDCS
1997
IEEE
15 years 4 months ago
Intrusion ripple analysis in distributed information systems
: Security is a very important aspect of distributed computing systems, especially in distributed information environments involving widearea networks, such as internets. In this p...
S. S. Yau, Jun Zhu