Sciweavers

123 search results - page 13 / 25
» Modeling the Trust Boundaries Created by Securable Objects
Sort
View
HCSE
2010
14 years 9 months ago
The Secret Lives of Assumptions: Developing and Refining Assumption Personas for Secure System Design
Personas are useful for obtaining an empirically grounded understanding of a secure system's user population, its contexts of use, and possible vulnerabilities and threats end...
Shamal Faily, Ivan Flechais
EDOC
2003
IEEE
15 years 5 months ago
Contract Performance Assessment for Secure and Dynamic Virtual Collaborations
In this paper we sketch a framework supporting contract enactment within the context of virtual organisation units that are dynamically created in order to achieve a common object...
Theodosis Dimitrakos, Ivan Djordjevic, Zoran Milos...
SIS
2008
15 years 1 months ago
An Access Control Model for Location based Services
In this paper we propose an access control model for use by a trusted middleware infrastructure, which is part of an architecture that supports the operation of Location Based Serv...
Cameron Ross Dunne, Thibault Candebat, David Gray
HERCMA
2001
141views Mathematics» more  HERCMA 2001»
15 years 1 months ago
Towards an ISO-9000 compliant certification service provider
In this paper we present a complete reference framework for the operation of Certification Service Provider as an organisation. The objective is to form an intermediate reference m...
Dimitrios Lekkas, Stefanos Gritzalis, Sokratis K. ...
SMA
2003
ACM
169views Solid Modeling» more  SMA 2003»
15 years 5 months ago
Surface reconstruction of freeform objects based on multiresolution volumetric method
3D scanners developed over the past several decades have facilitated the reconstruction of complicated engineering parts. Typically the boundary representation of a part is recons...
Sergei Azernikov, Alex Miropolsky, Anath Fischer