Sciweavers

902 search results - page 33 / 181
» Security and Trust Requirements Engineering
Sort
View
ESWS
2006
Springer
15 years 1 months ago
WSTO: A Classification-Based Ontology for Managing Trust in Semantic Web Services
The aim of this paper is to provide a general ontology that allows the specification of trust requirements in the Semantic Web Services environment. Both client and Web Service can...
Stefania Galizia
TRUST
2009
Springer
15 years 4 months ago
Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture
During many crises, access to sensitive emergency-support information is required to save lives and property. For example, for effective evacuations first responders need the name...
Timothy E. Levin, Jeffrey S. Dwoskin, Ganesha Bhas...
COMCOM
2007
83views more  COMCOM 2007»
14 years 9 months ago
Improving authentication of remote card transactions with mobile personal trusted devices
Credit card transactions are a popular and diffused means of payment over the network. Unfortunately, current technology does not allow us to technically solve disputes that may ...
Andrea Bottoni, Gianluca Dini
WISA
2007
Springer
15 years 3 months ago
A Compositional Multiple Policies Operating System Security Model
Multilevel security policies aim at only confidentiality assurance, with less consideration on integrity assurance and weakness in expressing channel control policies. Besides, the...
Lei Xia, Wei Huang, Hao Huang
74
Voted
ITRUST
2004
Springer
15 years 3 months ago
The Use of Formal Methods in the Analysis of Trust (Position Paper)
Security and trust are two properties of modern computing systems that are the focus of much recent interest. They play an increasingly significant role in the requirements for mo...
Michael J. Butler, Michael Leuschel, Stépha...