Sciweavers

129 search results - page 4 / 26
» Guidelines for designing IT security management tools
Sort
View
80
Voted
IJBC
2006
93views more  IJBC 2006»
14 years 9 months ago
Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems
In recent years, a large amount of work on chaos-based cryptosystems have been published. However many of the proposed schemes fail to explain or do not possess a number of featur...
Gonzalo Álvarez, Shujun Li
ISF
2007
104views more  ISF 2007»
14 years 9 months ago
Overcoming organizational challenges to secure knowledge management
—Successful secure knowledge management requires consideration of both technical and organizational concerns. We use the example of existing industrial incident management system...
Finn Olav Sveen, Eliot Rich, Matthew Jager
ITRUST
2005
Springer
15 years 3 months ago
ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements
ST-Tool is a graphical tool integrating an agent-oriented requirements engineering methodology with tools for the formal analysis of models. Essentially, the tool allows designers ...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, A...
OOPSLA
2007
Springer
15 years 3 months ago
SmartEMF: guidance in modeling tools
The advent of domain-specific modeling in enterprise systems development has given rise to new tool requirements. Existing tools do not offer sufficient modeling guidance or inc...
Anders Hessellund
IDEAL
2009
Springer
14 years 7 months ago
Implementation and Integration of Algorithms into the KEEL Data-Mining Software Tool
This work is related to the KEEL1 (Knowledge Extraction based on Evolutionary Learning) tool, a non-commercial software that supports data management, design of experiments and an ...
Alberto Fernández, Julián Luengo, Jo...