Sciweavers

662 search results - page 99 / 133
» The Functionality Attribute of Cybergenres
Sort
View
67
Voted
IEEEARES
2007
IEEE
15 years 4 months ago
Effects of Architectural Decisions in Authentication and Authorisation Infrastructures
AAIs – Infrastructures for Authentication and Authorisation provide services for service providers on the Internet. Especially if combined with an attribute infrastructure these...
Christian Schläger, Monika Ganslmayer
CSCLP
2007
Springer
15 years 3 months ago
Preference-Based Problem Solving for Constraint Programming
Abstract. Combinatorial problems such as scheduling, resource allocation, and configuration have many attributes that can be subject of user preferences. Traditional optimization ...
Ulrich Junker
95
Voted
HUC
2007
Springer
15 years 3 months ago
Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments
Most of today’s authentication schemes involve verifying the identity of a principal in some way. This process is commonly known as entity authentication. In emerging ubiquitous ...
Adrian Leung, Chris J. Mitchell
IFIP
2007
Springer
15 years 3 months ago
Insider Threat Analysis Using Information-Centric Modeling
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling sys...
Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, S. P...
70
Voted
ISVC
2007
Springer
15 years 3 months ago
Image and Volume Segmentation by Water Flow
Abstract. A general framework for image segmentation is presented in this paper, based on the paradigm of water flow. The major water flow attributes like water pressure, surface t...
Xin U. Liu, Mark S. Nixon