Sciweavers

117 search results - page 10 / 24
» Towards a Generic Process for Security Pattern Integration
Sort
View
SPW
2000
Springer
15 years 3 months ago
Users and Trust in Cyberspace
The underlying belief and knowledge models assumed by various kinds of authentication protocols have been studied for well over 10 years now. On the other hand, the related questio...
Pekka Nikander, Kristiina Karvonen
DEXAW
2005
IEEE
133views Database» more  DEXAW 2005»
15 years 1 months ago
Inductive Databases: Towards a New Generation of Databases for Knowledge Discovery
Data mining applications are typically used in the decision making process. The Knowledge Discovery Process (KDD process for short) is a typical iterative process, in which not on...
Rosa Meo
EUROPKI
2005
Springer
15 years 5 months ago
Legal Security for Transformations of Signed Documents: Fundamental Concepts
Abstract. Transformations of signed documents raise questions of technical and organisational nature which render the legal security of the transformed document doubtful. In partic...
Andreas U. Schmidt, Zbynek Loebl
OOPSLA
2005
Springer
15 years 5 months ago
Pattern transformation for two-dimensional separation of concerns
Design patterns are applied in software development to decouple individual concerns, so that a change in a design decision is isolated to one location of the code base. However, m...
Xiaoqing Wu
JSW
2008
98views more  JSW 2008»
14 years 11 months ago
Towards a Collaborative and Systematic Approach to Alert Verification
With the menace of hackers increasing every day, even well administrated networks are vulnerable to attack. Therefore, securing network assets has become a significant issue for th...
Xuejiao Liu, Debao Xiao, Xi Peng