Sciweavers

199 search results - page 20 / 40
» Towards an Integrated Conceptual Model of Security and Depen...
Sort
View
JCS
2010
80views more  JCS 2010»
14 years 4 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...
JSW
2008
98views more  JSW 2008»
14 years 9 months ago
Towards a Collaborative and Systematic Approach to Alert Verification
With the menace of hackers increasing every day, even well administrated networks are vulnerable to attack. Therefore, securing network assets has become a significant issue for th...
Xuejiao Liu, Debao Xiao, Xi Peng
HICSS
2006
IEEE
179views Biometrics» more  HICSS 2006»
15 years 3 months ago
e-Government Integration with Web Services and Alerts: A Case Study on an Emergency Route Advisory System in Hong Kong
Quick and efficient response to emergency is important for every city. This depends on the quality of the dispatch of emergency service to the scene and back to hospital or other ...
Cherrie W. W. Ng, Dickson K. W. Chiu
CCGRID
2002
IEEE
15 years 2 months ago
Towards Trust-Aware Resource Management in Grid Computing Systems
Resource management is a central part of a Grid computing system. In a large-scale wide-area system such as the Grid, security is a prime concern. One approach is to be conservati...
Farag Azzedin, Muthucumaru Maheswaran
EDBT
2009
ACM
112views Database» more  EDBT 2009»
15 years 2 months ago
GCIP: exploiting the generation and optimization of integration processes
As a result of the changing scope of data management towards the management of highly distributed systems and applications, integration processes have gained in imporuch integrati...
Matthias Böhm, Uwe Wloka, Dirk Habich, Wolfga...