Sciweavers

381 search results - page 74 / 77
» Business Informatics: An Engineering Perspective on Informat...
Sort
View
106
Voted
CCS
2004
ACM
15 years 3 months ago
MAC and UML for secure software design
Security must be a first class citizen in the design of large scale, interacting, software applications, at early and all stages of the lifecycle, for accurate and precise policy ...
Thuong Doan, Steven A. Demurjian, T. C. Ting, Andr...
WWW
2009
ACM
15 years 11 months ago
All your contacts are belong to us: automated identity theft attacks on social networks
Social networking sites have been increasingly gaining popularity. Well-known sites such as Facebook have been reporting growth rates as high as 3% per week [5]. Many social netwo...
Leyla Bilge, Thorsten Strufe, Davide Balzarotti, E...
WWW
2003
ACM
15 years 11 months ago
Supporting Cooperative Activities with Shared Hypermedia Workspaces on the WWW
Team members usually cooperate on a business process by partitioning it into several activities, which in turn generate one or more work items. Work items either need to be proces...
Jörg M. Haake, Jessica Rubart, Weigang Wang
82
Voted
EUROPAR
2003
Springer
15 years 3 months ago
FOBS: A Lightweight Communication Protocol for Grid Computing
The advent of high-performance networks in conjunction with low-cost, powerful computational engines has made possible the development of a new set of technologies termed computat...
Phillip M. Dickens
95
Voted
DIMVA
2006
14 years 11 months ago
Using Static Program Analysis to Aid Intrusion Detection
Abstract. The Internet, and in particular the world-wide web, have become part of the everyday life of millions of people. With the growth of the web, the demand for on-line servic...
Manuel Egele, Martin Szydlowski, Engin Kirda, Chri...