Sciweavers

1444 search results - page 32 / 289
» The end of users
Sort
View
FM
2005
Springer
125views Formal Methods» more  FM 2005»
15 years 3 months ago
End-to-End Integrated Security and Performance Analysis on the DEGAS Choreographer Platform
Abstract. We present a software tool platform which facilitates security and performance analysis of systems which starts and ends with UML model descriptions. A UML project is pre...
Mikael Buchholtz, Stephen Gilmore, Valentin Haenel...
ISW
2009
Springer
15 years 4 months ago
F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services
The frequency and severity of a number of recent intrusions involving data theft and leakages has shown that online users’ trust, voluntary or not, in the ability of third partie...
Matthew Burnside, Angelos D. Keromytis
ICALT
2005
IEEE
15 years 3 months ago
A System Designed to Support Formative Assessment of Open-Ended Written Assignments
This paper introduces the MarkTool System – a software system designed to support formative assessment of open-ended written assignments. The MarkTool System brings together ser...
Jun Zhang, Eva Heinrich
ICSOC
2009
Springer
15 years 2 months ago
End-to-End Security for Enterprise Mashups
Abstract. Mashups are gaining momentum as a means to develop situational Web applications by combining different resources (services, data feeds) and user interfaces. In enterpris...
Florian Rosenberg, Rania Khalaf, Matthew J. Duftle...
APNOMS
2006
Springer
14 years 11 months ago
End-to-End QoS Guaranteed Service in WLAN and 3GPP Interworking Network
In this paper, we model the end-to-end QoS provisioning mechanisms in the WLAN and 3GPP interworking network. For the end-to-end QoS guaranteed service, we model the control plane ...
Sung-Min Oh, Jae-Hyun Kim, You-Sun Hwang, Hyeyeon ...