Sciweavers

131 search results - page 23 / 27
» assets 2007
Sort
View
EUROPKI
2007
Springer
15 years 1 months ago
OpenHSM: An Open Key Life Cycle Protocol for Public Key Infrastructure's Hardware Security Modules
Abstract. The private keys used in a PKI are its most important asset. Protect these keys from unauthorised use or disclosure is essential to secure a PKI. Relying parties need ass...
Jean Everson Martina, Túlio Cicero Salvaro ...
70
Voted
BDIM
2007
IEEE
115views Business» more  BDIM 2007»
14 years 9 months ago
Specifying Information Security Needs for the Delivery of High Quality Security Services
In this paper we present an approach for specifying respect to security. When an organization wants to secure and prioritizing information security requirements in organiza- its sy...
Xiaomeng Su, Damiano Bolzoni, Pascal van Eck
MMS
2008
14 years 9 months ago
Canonical processes of semantically annotated media production
While many multimedia systems allow the association of semantic annotations with media assets, there is no agreedupon way of sharing these among systems. As an initial step within...
Lynda Hardman, Zeljko Obrenovic, Frank Nack, Brigi...
JDCTA
2010
122views more  JDCTA 2010»
14 years 4 months ago
The Financial Structure and High-Tech Industries Development in China
The transformation of economic development approach demands to develop high-tech industries, while high-tech industries can't develop without financial support, in which diff...
Liuyong Yang, Shensheng Mo, Anqi Zhou
BMCBI
2007
246views more  BMCBI 2007»
14 years 9 months ago
TomoJ: tomography software for three-dimensional reconstruction in transmission electron microscopy
Background: Transmission electron tomography is an increasingly common three-dimensional electron microscopy approach that can provide new insights into the structure of subcellul...
Cédric Messaoudi, Thomas Boudier, Carlos Os...