Sciweavers

129 search results - page 9 / 26
» Guidelines for designing IT security management tools
Sort
View
FORTE
2003
14 years 11 months ago
A Lightweight Formal Analysis of a Multicast Key Management Scheme
Abstract. This paper describes the analysis of Pull-Based Asynchronous Rekeying Framework (ARF), a recently proposed solution to the scalable group key management problem in secure...
Mana Taghdiri, Daniel Jackson
GROUP
2009
ACM
15 years 4 months ago
Exploring the use of Wikis for information sharing in interdisciplinary design
Interdisciplinary design has created challenges in design collaboration due to the difficulty in communicating and coordinating across disciplines. Many tools have been developed ...
Ammy Jiranida Phuwanartnurak
CCS
2004
ACM
15 years 2 months ago
MAC and UML for secure software design
Security must be a first class citizen in the design of large scale, interacting, software applications, at early and all stages of the lifecycle, for accurate and precise policy ...
Thuong Doan, Steven A. Demurjian, T. C. Ting, Andr...
73
Voted
DISCEX
2003
IEEE
15 years 2 months ago
MuCAPSL
Secure group communication protocols have been designed to meet needs such as secure management of group membership, confidential group communication, and access control. New lan...
Jonathan K. Millen, Grit Denker
HICSS
2000
IEEE
130views Biometrics» more  HICSS 2000»
15 years 1 months ago
Towards a Relationship Navigation Analysis
Many conceptual modeling and system design methodologies provide tools to help system designers to model the real world. No guidelines exist, however, for determining the relation...
Joonhee Yoo, Michael Bieber