Sciweavers

619 search results - page 93 / 124
» IFIP
Sort
View
IFIP12
2009
14 years 9 months ago
Quality Classifiers for Open Source Software Repositories
Open Source Software (OSS) often relies on large repositories, like SourceForge, for initial incubation. The OSS repositories offer a large variety of meta-data providing interesti...
George Tsatsaronis, Maria Halkidi, Emmanouel A. Gi...
IFIP
2010
Springer
14 years 9 months ago
Supporting DSS Acceptability through a User-Centered Design Methodology: Experiences in Emergency Management
This paper presents a user-centered design methodology for Decision Support Systems (DSSs), which is specifically built to face the socio-technical gap that often impedes DSS accep...
Pietro Baroni, Daniela Fogli, Massimiliano Giacomi...
IFIP
2010
Springer
14 years 6 months ago
A Formal Analysis of Authentication in the TPM
The Trusted Platform Module (TPM) is a hardware chip designed to enable computers to achieve a greater level of security than is possible in software alone. To this end, the TPM pr...
Stéphanie Delaune, Steve Kremer, Mark Dermo...
IFIP
2010
Springer
14 years 6 months ago
Cryptographic Enforcement of Role-Based Access Control
Many cryptographic schemes have been designed to enforce information flow policies. However, enterprise security requirements are often better encoded, or can only be encoded, usin...
Jason Crampton
IFIP
2010
Springer
14 years 6 months ago
Modular Plans for Secure Service Composition
Service Oriented Computing (SOC) is a programming paradigm aiming at characterising Service Networks. Services are entities waiting for clients requests and they often result from ...
Gabriele Costa, Pierpaolo Degano, Fabio Martinelli