Sciweavers

12478 search results - page 121 / 2496
» Secure Interaction Design
Sort
View
107
Voted
ATAL
2005
Springer
15 years 9 months ago
Hermes: a methodology for goal oriented agent interactions
We present the Hermes approach for goal-oriented interaction which includes a methodology for designing goal-based interactions and a process for mapping design artefacts to an ex...
Christopher Cheong, Michael Winikoff
154
Voted
DEXAW
2008
IEEE
126views Database» more  DEXAW 2008»
15 years 5 months ago
Incorporating Database Systems into a Secure Software Development Methodology
We have proposed in the past three separate methodologies for secure software development. We have found that they have many common and complementary aspects and we proposed a com...
Eduardo B. Fernández, Jan Jürjens, Nob...
121
Voted
IEEEARES
2006
IEEE
15 years 9 months ago
Towards an Integrated Conceptual Model of Security and Dependability
It is now commonly accepted that security and dependability largely represent two different aspects of an overall meta-concept that reflects the trust that we put in a computer s...
Erland Jonsson
124
Voted
NSPW
2004
ACM
15 years 9 months ago
A collaborative approach to autonomic security protocols
This paper considers a new security protocol paradigm whereby principals negotiate and on-the-fly generate security protocols according to their needs. When principals wish to in...
Hongbin Zhou, Simon N. Foley
158
Voted
JCS
2011
156views more  JCS 2011»
14 years 10 months ago
Securing low-cost RFID systems: An unconditionally secure approach
We explore a new direction towards solving the identity authentication problem in RFID systems. We break the RFID authentication process into two main problems: message authenticat...
Basel Alomair, Loukas Lazos, Radha Poovendran