Sciweavers

5475 search results - page 196 / 1095
» Model Driven Security
Sort
View
156
Voted
IADIS
2003
15 years 5 months ago
Shorter Time-To-Market Through a Pattern-Driven Architectural Framework
Developing and evolving complex Web-based systems with strict requirement for shorter time-to-market needs good and systematic engineering approaches and especially an elegant way...
Jianyun Zhou, Tor Stålhane
105
Voted
ACSAC
2003
IEEE
15 years 9 months ago
Modelling Contexts in the Or-BAC Model
As computer infrastructures become more complex, security models must provide means to handle more flexible and dynamic requirements. In the Organization Based Access Control (Or...
Frédéric Cuppens, Alexandre Mi&egrav...
151
Voted
JSSPP
2005
Springer
15 years 9 months ago
Enhancing Security of Real-Time Applications on Grids Through Dynamic Scheduling
Real-time applications with security requirements are emerging in various areas including government, education, and business. The security sensitive real-time applications can ta...
Tao Xie 0004, Xiao Qin
113
Voted
ESORICS
2006
Springer
15 years 7 months ago
TrustedPals: Secure Multiparty Computation Implemented with Smart Cards
We study the problem of Secure Multi-party Computation (SMC) in a model where individual processes contain a tamper-proof security module, and introduce the TrustedPals framework, ...
Milan Fort, Felix C. Freiling, Lucia Draque Penso,...
216
Voted
AICT
2010
IEEE
240views Communications» more  AICT 2010»
14 years 7 months ago
Providing Security in 4G Systems: Unveiling the Challenges
— Several research groups are working on designing new security architectures for 4G networks such as Hokey and Y-Comm. Since designing an efficient security module requires a cl...
Mahdi Aiash, Glenford E. Mapp, Aboubaker Lasebae, ...