Sciweavers

2719 search results - page 63 / 544
» Exposing Application Alternatives
Sort
View
RE
2009
Springer
15 years 12 months ago
Trust Trade-off Analysis for Security Requirements Engineering
Abstract—Security requirements often have implicit assumptions about trust relationships among actors. The more actors trust each other, the less stringent the security requireme...
Golnaz Elahi, Eric S. K. Yu
134
Voted
NOMS
2008
IEEE
15 years 11 months ago
Dynamic inter-organizational cooperation setup in Circle-of-Trust environments
—The need for collaborative service provisioning across different providers’ domains is being addressed by Circles of Trust (CoT), whose members adhere to the same policies and...
Latifa Boursas, Vitalian A. Danciu
119
Voted
ISPW
2007
IEEE
15 years 11 months ago
The Economic Impact of Software Process Variations
The economic benefit of a certain development process or particular activity is usually unknown and indeed hard to predict. However, the cost-effectiveness of process improvement...
Florian Deissenboeck, Markus Pizka
ATAL
2007
Springer
15 years 11 months ago
An advanced bidding agent for advertisement selection on public displays
In this paper we present an advanced bidding agent that participates in first-price sealed bid auctions to allocate advertising space on BluScreen – an experimental public adve...
Alex Rogers, Esther David, Terry R. Payne, Nichola...
CEAS
2007
Springer
15 years 11 months ago
Slicing Spam with Occam's Razor
To evade blacklisting, the vast majority of spam email is sent from exploited MTAs (i.e., botnets) and with forged “From” addresses. In response, the anti-spam community has d...
Chris Fleizach, Geoffrey M. Voelker, Stefan Savage