Sciweavers

371 search results - page 66 / 75
» On the Modeling of Bell-LaPadula Security Policies Using RBA...
Sort
View
101
Voted
ASIASIM
2004
Springer
15 years 5 months ago
Design and Implementation of an SSL Component Based on CBD
Abstract. SSL is one of the most popular protocols used on the Internet for secure communications. However SSL protocol has several problems. First, SSL protocol brings considerabl...
Eun-Ae Cho, Young-Gab Kim, Chang-Joo Moon, Doo-Kwo...
99
Voted
ACISICIS
2007
IEEE
15 years 6 months ago
Trust Realisation in Multi-domain Collaborative Environments
In the Internet-age, the geographical boundaries that have previously impinged upon inter-organisational collaborations have become decreasingly important. Of more importance for ...
Oluwafemi Ajayi, Richard O. Sinnott, Anthony Stell
DSS
2008
97views more  DSS 2008»
14 years 11 months ago
On supply chain cash flow risks
This study models the supply chain related cash flow risks for a business entity measured by the standard deviations of cash inflows, outflows, and netflows of each period in a pl...
Chih-Yang Tsai
TDP
2010
140views more  TDP 2010»
14 years 6 months ago
Movement Data Anonymity through Generalization
In recent years, spatio-temporal and moving objects databases have gained considerable interest, due to the diffusion of mobile devices (e.g., mobile phones, RFID devices and GPS ...
Anna Monreale, Gennady L. Andrienko, Natalia V. An...
96
Voted
MSOM
2010
65views more  MSOM 2010»
14 years 6 months ago
The Optimal Composition of Influenza Vaccines Subject to Random Production Yields
The Vaccine and Related Biologic Products Advisory Committee meets at least once a year to decide the composition of the influenza vaccine in the U.S. Past evidence suggests that ...
Soo-Haeng Cho