Sciweavers

2429 search results - page 289 / 486
» Using Aspects to Design a Secure System
Sort
View
MMMACNS
2001
Springer
15 years 7 months ago
Typed MSR: Syntax and Examples
Abstract. Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Archit...
Iliano Cervesato
DGO
2007
168views Education» more  DGO 2007»
15 years 4 months ago
A distributed event-triggered knowledge sharing system
Government agencies globally are facing problems such as illegal immigration, terrorism, and disease diagnosis and control. Solutions to these problems rely heavily on collaborati...
Seema Degwekar, Jeff DePree, Stanley Y. W. Su, How...
CHI
2011
ACM
14 years 6 months ago
Opportunities for computing technologies to support healthy sleep behaviors
Getting the right amount of quality sleep is a key aspect of good health, along with a healthy diet and regular exercise. Human-computer interaction (HCI) researchers have recentl...
Eun Kyoung Choe, Sunny Consolvo, Nathaniel F. Wats...
CCS
2007
ACM
15 years 9 months ago
Trust management services in relational databases
Trust management represents today a promising approach for supporting access control in open environments. While several approaches have been proposed for trust management and sig...
Sabrina De Capitani di Vimercati, Sushil Jajodia, ...
CCR
2010
152views more  CCR 2010»
15 years 17 days ago
CYBEX: the cybersecurity information exchange framework (x.1500)
The cybersecurity information exchange framework, known as CYBEX, is currently undergoing its first iteration of standardization efforts within ITU-T. The framework describes how ...
Anthony M. Rutkowski, Youki Kadobayashi, Inette Fu...