Sciweavers

657 search results - page 79 / 132
» Secure and Usable Requirements Engineering
Sort
View
AGENTS
2001
Springer
15 years 2 months ago
Improving the agent-oriented modeling process by roles
The agent-oriented modeling process is divided in a typical sequence of activities, i.e., requirements specification, analysis, and design. The requirements are specified by des...
Ralph Depke, Reiko Heckel, Jochen Malte Küste...
VIZSEC
2005
Springer
15 years 3 months ago
Visual Correlation of Host Processes and Network Traffic
Anomalous communication patterns are one of the leading indicators of computer system intrusions according to the system administrators we have interviewed. But a major problem is...
Glenn A. Fink, Paul Muessig, Chris North
EXTREME
2003
ACM
15 years 3 months ago
Can Topic Maps describe context for enterprise-wide applications?
Topic maps provide exciting opportunities not just to make information easier to find, but to increase the usability of software. In order to provide users with the information th...
Duane Degler, Lisa Battle
MA
1997
Springer
149views Communications» more  MA 1997»
15 years 2 months ago
Java-Based Mobile Agents - How to Migrate, Persist, and Interact on Electronic Service Markets
This paper presents a mobile agent approach that aims at satisfying the following requirements of open Internet-based electronic service markets: the mobile agent system should be...
Boris Liberman, Frank Griffel, Michael Merz, Winfr...
CRYPTO
2008
Springer
75views Cryptology» more  CRYPTO 2008»
14 years 11 months ago
New Efficient Attacks on Statistical Disclosure Control Mechanisms
The goal of a statistical database is to provide statistics about a population while simultaneously protecting the privacy of the individual records in the database. The tension be...
Cynthia Dwork, Sergey Yekhanin