Sciweavers

674 search results - page 39 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
110
Voted
WSC
2007
15 years 15 hour ago
Stability analysis of the supply chain by using neural networks and genetic algorithms
Effectively managing a supply chain requires visibility to detect unexpected variations in the dynamics of the supply chain environment at an early stage. This paper proposes a me...
Alfonso Sarmiento, Luis Rabelo, Ramamoorthy Lakkoj...
JTAER
2007
125views more  JTAER 2007»
14 years 9 months ago
Australian Case Studies in Mobile Commerce
Sixteen wireless case studies highlight issues relating to mobile commerce in Australia. The issues include: the need for a clear business case; difficulty of achieving critical m...
Jonathan O'Donnell, Margaret Jackson, Marita Shell...
ASIACRYPT
2006
Springer
15 years 1 months ago
On the Security of OAEP
Currently, the best and only evidence of the security of the OAEP encryption scheme is a proof in the contentious random oracle model. Here we give further arguments in support of...
Alexandra Boldyreva, Marc Fischlin
62
Voted
HICSS
2007
IEEE
97views Biometrics» more  HICSS 2007»
15 years 4 months ago
Implementation-Oriented Secure Architectures
We propose a framework for constructing secure systems at the architectural level. This framework is composed of an implementation-oriented formalization of a system’s architect...
Daniel Conte de Leon, Jim Alves-Foss, Paul W. Oman
KDD
2012
ACM
178views Data Mining» more  KDD 2012»
13 years 4 days ago
Differentially private transit data publication: a case study on the montreal transportation system
With the wide deployment of smart card automated fare collection (SCAFC) systems, public transit agencies have been benefiting from huge volume of transit data, a kind of sequent...
Rui Chen, Benjamin C. M. Fung, Bipin C. Desai, N&e...