Sciweavers

1587 search results - page 275 / 318
» Security Patterns and Secure Systems Design Using UML
Sort
View
BMCBI
2010
193views more  BMCBI 2010»
14 years 10 months ago
caGrid Workflow Toolkit: A Taverna based workflow tool for cancer Grid
Background: In biological and medical domain, the use of web services made the data and computation functionality accessible in a unified manner, which helped automate the data pi...
Wei Tan, Ravi K. Madduri, Aleksandra Nenadic, Stia...
VLDB
2007
ACM
295views Database» more  VLDB 2007»
15 years 4 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
MOBISYS
2010
ACM
15 years 5 days ago
Ensemble: cooperative proximity-based authentication
Ensemble is a system that uses a collection of trusted personal devices to provide proximity-based authentication in pervasive environments. Users are able to securely pair their ...
Andre Kalamandeen, Adin Scannell, Eyal de Lara, An...
VLSID
2006
IEEE
142views VLSI» more  VLSID 2006»
15 years 10 months ago
Impact of Configurability and Extensibility on IPSec Protocol Execution on Embedded Processors
- Security protocols, such as IPSec and SSL, are being increasingly deployed in the context of networked embedded systems. The resource-constrained nature of embedded systems and, ...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
OOPSLA
2009
Springer
15 years 4 months ago
Debug all your code: portable mixed-environment debugging
Programmers build large-scale systems with multiple languages to reuse legacy code and leverage languages best suited to their problems. For instance, the same program may use Jav...
Byeongcheol Lee, Martin Hirzel, Robert Grimm, Kath...