Sciweavers

1949 search results - page 126 / 390
» Protective Interface Specifications
Sort
View
RE
2006
Springer
15 years 1 months ago
Requirement Progression in Problem Frames Applied to a Proton Therapy System
A technique is presented for obtaining a specification from a requirement through a series of incremental steps. The starting point is a Problem Frame description involving a requ...
Robert Seater, Daniel Jackson
ICDE
2006
IEEE
176views Database» more  ICDE 2006»
16 years 3 months ago
Mondrian Multidimensional K-Anonymity
K-Anonymity has been proposed as a mechanism for protecting privacy in microdata publishing, and numerous recoding "models" have been considered for achieving kanonymity...
Kristen LeFevre, David J. DeWitt, Raghu Ramakrishn...
ESORICS
2009
Springer
16 years 2 months ago
The Coremelt Attack
Current Denial-of-Service (DoS) attacks are directed towards a specific victim. The research community has devised several countermeasures that protect victim hosts against undesir...
Ahren Studer, Adrian Perrig
CCS
2009
ACM
16 years 2 months ago
Intrusion response cost assessment methodology
In this paper we present a structured methodology for evaluating cost of responses based on three factors: the response operational cost associated with the daily maintenance of t...
Chris Strasburg, Natalia Stakhanova, Samik Basu, J...
PERCOM
2004
ACM
16 years 1 months ago
Untraceable Secret Credentials: Trust Establishment with Privacy
There is generally no a priori trust relationship among entities interacting in pervasive computing environments which makes it necessary to establish trust from scratch. This tas...
Laurent Bussard, Yves Roudier, Refik Molva