Sciweavers

5475 search results - page 143 / 1095
» Model Driven Security
Sort
View
118
Voted
EUROCRYPT
2008
Springer
15 years 2 months ago
Towards Key-Dependent Message Security in the Standard Model
Standard security notions for encryption schemes do not guarantee any security if the encrypted messages depend on the secret key. Yet it is exactly the stronger notion of security...
Dennis Hofheinz, Dominique Unruh
EDOC
2007
IEEE
15 years 7 months ago
An Enterprise Architecture Alignment Measure for Telecom Service Development
The increasing complexity of modern Information Services (IS) makes necessary to carry on review activities. For many companies, these reviews take place within the framework of t...
Jacques Simonin, Yves Le Traon, Jean-Marc Jé...
103
Voted
ANSS
1997
IEEE
15 years 5 months ago
JSIM: A JAVA-Based Simulation and Animation Environment
In this paper, we present JSIM, a Java-based simulation and animation environment being developed at the University of Georgia. The JSIM library includes many Java classes to make...
John A. Miller, Rajesh S. Nair, Zhiwei Zhang, Hong...
96
Voted
WSC
2008
15 years 3 months ago
A systems engineering process supporting the development of operational requirements driven federations
This paper proposes a systems engineering process utilizing the conceptual artifacts of the Model Driven Architecture (MDA) describing platform independent views of models to capt...
Andreas Tolk, Thomas G. Litwin, Robert H. Kewley
98
Voted
ICC
2009
IEEE
118views Communications» more  ICC 2009»
15 years 7 months ago
A First Order Logic Security Verification Model for SIP
: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...