Sciweavers

674 search results - page 60 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
NSPW
2003
ACM
15 years 7 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...
CHI
2007
ACM
16 years 2 months ago
Work-centered design: a case study of a mixed-initiative scheduler
We present the case study of a complex, mixed-initiative scheduling system to illustrate Work-Centered Design (WCD), a new approach for the design of information systems. WCD is b...
Keith A. Butler, Jiajie Zhang, Chris Esposito, Ali...
HICSS
2008
IEEE
192views Biometrics» more  HICSS 2008»
15 years 8 months ago
Agent-Based Electricity Balancing with Distributed Energy Resources, A Multiperspective Case Study
Abstract— Distributed generation (DG) of electricity is providing an increasing part of the worldwide electricity supply. At the same time, there is a big potential of demand res...
Koen Kok, Zsófia Derzsi, Jaap Gordijn, Maar...
124
Voted
CTRSA
2007
Springer
98views Cryptology» more  CTRSA 2007»
15 years 3 months ago
Identity-Based Multi-signatures from RSA
Abstract. Multi-signatures allow multiple signers to jointly authenticate a message using a single compact signature. Many applications however require the public keys of the signe...
Mihir Bellare, Gregory Neven
EUROCRYPT
2008
Springer
15 years 3 months ago
Efficient Two Party and Multi Party Computation Against Covert Adversaries
Recently, Aumann and Lindell introduced a new realistic security model for secure computation, namely, security against covert adversaries. The main motivation was to obtain secure...
Vipul Goyal, Payman Mohassel, Adam Smith