Sciweavers

117 search results - page 9 / 24
» Towards a Generic Process for Security Pattern Integration
Sort
View
ICDCSW
2005
IEEE
15 years 3 months ago
Specifying Information-Flow Controls
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
Howard Chivers, Jeremy Jacob
FCCM
2004
IEEE
133views VLSI» more  FCCM 2004»
15 years 1 months ago
A Methodology for Synthesis of Efficient Intrusion Detection Systems on FPGAs
Intrusion detection for network security is a computation intensive application demanding high system performance. System level design, a relatively unexplored field in this area,...
Zachary K. Baker, Viktor K. Prasanna
JSW
2007
173views more  JSW 2007»
14 years 9 months ago
Towards Semantics Driven Generation of Executable Web Services Compositions
— Web services composition is a very active area of research due to the growing interest of public and private organizations in services integration and/or low cost development o...
Giusy Di Lorenzo, Nicola Mazzocca, Francesco Mosca...
79
Voted
OOPSLA
2007
Springer
15 years 3 months ago
A framework for distributed collaborative conceptual model development
One of the major concerns in the processes which involve human analysts is the existence of uncertainty/inconsistency. In this paper, we propose a model based on belief theory tha...
Ebrahim Bagheri, Ali A. Ghorbani
83
Voted
CAISE
2005
Springer
15 years 3 months ago
Developing Adapters for Web Services Integration
The push toward business process automation has generated the need for integrating different enterprise applications involved in such processes. The typical approach to integration...
Boualem Benatallah, Fabio Casati, Daniela Grigori,...