Sciweavers

1734 search results - page 221 / 347
» What works
Sort
View
ACSAC
2001
IEEE
15 years 4 months ago
Securing Web Servers against Insider Attack
Too often, "security of Web transactions" reduces to "encryption of the channel"--and neglects to address what happens at the server on the other end. This ove...
Shan Jiang, Sean W. Smith, Kazuhiro Minami
104
Voted
ASIACRYPT
2003
Springer
15 years 4 months ago
Untraceable Fair Network Payment Protocols with Off-Line TTP
A fair network payment protocol plays an important role in electronic commerce. The fairness concept in payments can be illustrated as that two parties (e.g. customers and merchant...
Chih-Hung Wang
149
Voted
EEF
2000
15 years 4 months ago
Distributed and Structured Analysis Approaches to Study Large and Complex Systems
Both the logic and the stochastic analysis of discrete-state systems are hindered by the combinatorial growth of the state space underlying a high-level model. In this work, we con...
Gianfranco Ciardo
109
Voted
WER
2000
Springer
15 years 4 months ago
Non-Functional Requirements for Object-Oriented Modeling
Recently, it has been pointed out that the majority of the requirements engineering methods do not take into account non-functional requirements (NFRs) [10][11]. Consequently, we h...
Jaime de Melo Sabat Neto, Julio Cesar Sampaio do P...
88
Voted
GECCO
2010
Springer
141views Optimization» more  GECCO 2010»
15 years 4 months ago
Today/future importance analysis
SBSE techniques have been widely applied to requirements selection and prioritization problems in order to ascertain a suitable set of requirements for the next release of a syste...
Yuanyuan Zhang, Enrique Alba, Juan J. Durillo, Sig...