ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2010 International Conference on Availability, Reliability and Security
Latest Publications
TOTAL DOCUMENTS
132
(FIVE YEARS 0)
H-INDEX
13
(FIVE YEARS 0)
Published By IEEE
9781424458790
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Welcome Message from the WSDF 2010 Workshop Organizers
2010 International Conference on Availability, Reliability and Security
◽
10.1109/ares.2010.123
◽
2010
◽
Download Full-text
Secured Key Distribution Scheme for Cryptographic Key Management System
2010 International Conference on Availability, Reliability and Security
◽
10.1109/ares.2010.96
◽
2010
◽
Cited By ~ 1
Author(s):
Kyawt Kyawt Khaing
◽
Khin Mi Mi Aung
Keyword(s):
Key Management
◽
Management System
◽
Key Distribution
◽
Distribution Scheme
◽
Cryptographic Key
Download Full-text
Fighting Phishing with Trusted Email
2010 International Conference on Availability, Reliability and Security
◽
10.1109/ares.2010.98
◽
2010
◽
Cited By ~ 4
Author(s):
Jordan Crain
◽
Lukasz Opyrchal
◽
Atul Prakash
Download Full-text
Copyright Page
2010 International Conference on Availability, Reliability and Security
◽
10.1109/ares.2010.3
◽
2010
◽
Download Full-text
Communal Reputation and Individual Trust (CRIT) in Wireless Sensor Networks
2010 International Conference on Availability, Reliability and Security
◽
10.1109/ares.2010.64
◽
2010
◽
Cited By ~ 6
Author(s):
Tanveer A Zia
◽
Md Zahidul Islam
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Wireless Sensor
Download Full-text
A Semi-Markov Survivability Evaluation Model for Intrusion Tolerant Database Systems
2010 International Conference on Availability, Reliability and Security
◽
10.1109/ares.2010.90
◽
2010
◽
Cited By ~ 3
Author(s):
Alex Hai Wang
◽
Su Yan
◽
Peng Liu
Keyword(s):
Evaluation Model
◽
Database Systems
◽
Intrusion Tolerant
Download Full-text
Welcome Message from the OSA 2010 Workshop Chair
2010 International Conference on Availability, Reliability and Security
◽
10.1109/ares.2010.8
◽
2010
◽
Download Full-text
Planning Dynamic Activity and Resource Allocations Using a Risk-Aware Business Process Management Approach
2010 International Conference on Availability, Reliability and Security
◽
10.1109/ares.2010.79
◽
2010
◽
Cited By ~ 1
Author(s):
Simon Tjoa
◽
Stefan Jakoubi
◽
Sigrun Goluch
◽
Gerhard Kitzler
Keyword(s):
Business Process
◽
Business Process Management
◽
Process Management
◽
Management Approach
◽
Resource Allocations
◽
Dynamic Activity
Download Full-text
Owner-Based Role-Based Access Control OB-RBAC
2010 International Conference on Availability, Reliability and Security
◽
10.1109/ares.2010.94
◽
2010
◽
Cited By ~ 5
Author(s):
Mohsen Saffarian
◽
Babak Sadighi
Keyword(s):
Access Control
◽
Role Based Access Control
◽
Role Based
Download Full-text
Supporting Authorization Policy Modification in Agile Development of Web Applications
2010 International Conference on Availability, Reliability and Security
◽
10.1109/ares.2010.19
◽
2010
◽
Author(s):
Steffen Bartsch
Keyword(s):
Web Applications
◽
Agile Development
◽
Authorization Policy
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close