Sciweavers

694 search results - page 40 / 139
» Security and Usability: Analysis and Evaluation
Sort
View
ECOWS
2007
Springer
15 years 1 months ago
SSL-over-SOAP: Towards a Token-based Key Establishment Framework for Web Services
Key establishment is essential for many applications of cryptography. Its purpose is to negotiate keys for other cryptographic schemes, usually for encryption and authentication. I...
Sebastian Gajek, Lijun Liao, Bodo Möller, J&o...
LADC
2007
Springer
15 years 6 months ago
Security Patterns and Secure Systems Design
Analysis and design patterns are well established as a convenient and reusable way to build high-quality object-oriented software. Patterns combine experience and good practices t...
Eduardo B. Fernández
CSCWD
2008
Springer
15 years 1 months ago
Collaboration in scientific visualization
This paper discusses the key collaborative features of scientific visualization systems. An experiment with several groups of users has been conducted to evaluate the usability an...
Steve Casera, Peter Kropf
ECIS
2003
15 years 1 months ago
Development of a security methodology for cooperative information systems: the cooPSIS project
Since networks and computing systems are vital components of today's life, it is of utmost importance to endow them with the capability to survive physical and logical faults...
Mariagrazia Fugini, Mario Mezzanzanica
PVM
2001
Springer
15 years 4 months ago
Review of Performance Analysis Tools for MPI Parallel Programs
In order to produce MPI applications that perform well on today’s parallel architectures, programmers need effective tools for collecting and analyzing performance data. Because ...
Shirley Moore, David Cronk, Kevin S. London, Jack ...