Sciweavers

5475 search results - page 46 / 1095
» Model Driven Security
Sort
View
135
Voted
CRISIS
2009
15 years 1 months ago
A reference model for risk-aware business process management
The major contribution of this paper is the
Stefan Jakoubi, Simon Tjoa
89
Voted
PAISI
2010
Springer
14 years 11 months ago
An Association Model for Implicit Crime Link Analysis
Jau-Hwang Wang, Chien-Lung Lin
CRYPTO
2012
Springer
215views Cryptology» more  CRYPTO 2012»
13 years 3 months ago
New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
We develop a new methodology for utilizing the prior techniques to prove selective security for functional encryption systems as a direct ingredient in devising proofs of full sec...
Allison B. Lewko, Brent Waters
CAV
2010
Springer
214views Hardware» more  CAV 2010»
15 years 4 months ago
Learning Component Interfaces with May and Must Abstractions
elor Thesis: Demand Driven Abstraction Refinement • Advisor: Dr. Andrey Rybalchenko Kendriya Vidyalaya ONGC, Dehradun, Uttaranchal INDIA All India Senior Secondary Examination, ...
Rishabh Singh, Dimitra Giannakopoulou, Corina S. P...