Sciweavers

762 search results - page 63 / 153
» Security Contexts in Autonomic Systems
Sort
View
VOTEID
2007
Springer
15 years 6 months ago
Assessing Procedural Risks and Threats in e-Voting: Challenges and an Approach
Performing a good security analysis on the design of a system is an essential step in order to guarantee a reasonable level of protection. However, different attacks and threats m...
Komminist Weldemariam, Adolfo Villafiorita, Andrea...
GLOBECOM
2008
IEEE
14 years 12 months ago
Security Rules Specification and Analysis Based on Passive Testing
Security is a critical issue in dynamic and open distributed environments such as network-based services or wireless networks. To ensure that a certain level of security is maintai...
Wissam Mallouli, Fayçal Bessayah, Ana R. Ca...
ACSAC
1999
IEEE
15 years 4 months ago
A Prototype Secure Workflow Server
Workflow systems provide automated support that enables organizations to efficiently and reliably move important data through their routine business processes. For some organizati...
Douglas L. Long, Julie Baker, Francis Fung
IJISTA
2010
109views more  IJISTA 2010»
14 years 10 months ago
BKCAS: a distributed context-aware pervasive information system to support user roaming
- Over the last few years, Pervasive Computing has become a very active research topic in both academia and industry. In spite of its undeniable benefit, until recently, the wide d...
Nguyen Chan Hung, Vu Thanh Vinh, Nguyen Huu Thang,...
CSFW
2004
IEEE
15 years 3 months ago
Owned Policies for Information Security
In many systems, items of information have owners associated with them. An owner of an item of information may want the system to enforce a policy that restricts use of that infor...
Hubie Chen, Stephen Chong