Sciweavers

1587 search results - page 67 / 318
» Security Patterns and Secure Systems Design Using UML
Sort
View
153
Voted
CORR
2011
Springer
227views Education» more  CORR 2011»
14 years 9 months ago
Message Structures: a modelling technique for information systems analysis and design
Despite the increasing maturity of model-driven development (MDD), some research challenges remain open in the field of information systems (IS). For instance, there is a need to i...
Sergio España, Arturo González, Osca...
114
Voted
DAGSTUHL
2006
15 years 4 months ago
A Framework for Analyzing Composition of Security Aspects
The methodology of aspect-oriented software engineering has been proposed to factor out concerns that are orthogonal to the core functionality of a system. In particular, this is a...
Jorge Fox, Jan Jürjens
119
Voted
SP
1996
IEEE
121views Security Privacy» more  SP 1996»
15 years 6 months ago
A Security Policy Model for Clinical Information Systems
The protection of personal health information has become a live issue in a number of countries including the USA, Canada, Britain and Germany. The debate has shown that there is w...
Ross J. Anderson
150
Voted
ISCI
2008
104views more  ISCI 2008»
15 years 2 months ago
Unconditionally secure cryptosystems based on quantum cryptography
Most modern cryptographic studies design cryptosystems and algorithms using mathematical concepts. In designing and analyzing cryptosystems and protocols, mathematical concepts ar...
Yu-Fang Chung, Zhen Yu Wu, Tzer-Shyong Chen
119
Voted
CODES
2004
IEEE
15 years 6 months ago
Low energy security optimization in embedded cryptographic systems
Future embedded and wireless devices will be increasingly powerful supporting many applications including one of the most crucial, security. Although many wireless and embedded de...
Catherine H. Gebotys