Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Paul El Khoury"'
Publikováno v:
First Break. 36:43-50
Cabin Creek Field, on the southwestern flank of the Williston Basin, is one of 14 hydrocarbon fields within Cedar Creek nticline. The field was initially discovered in May 1953 and developed by Shell starting with primary production followed by water
Publikováno v:
SEG Technical Program Expanded Abstracts 2018.
Publikováno v:
SEG Technical Program Expanded Abstracts 2017.
Publikováno v:
Enterprise Information Systems
Enterprise Information Systems, Taylor & Francis, 2013, 7 (1), pp.33-60. ⟨10.1080/17517575.2012.690891⟩
Enterprise Information Systems, 2013, 7 (1), pp.33-60. ⟨10.1080/17517575.2012.690891⟩
Enterprise Information Systems, Taylor & Francis, 2013, 7 (1), pp.33-60. ⟨10.1080/17517575.2012.690891⟩
Enterprise Information Systems, 2013, 7 (1), pp.33-60. ⟨10.1080/17517575.2012.690891⟩
Recent disasters, such as Hurricane Katrina in 2005, have shown several issues for the coordination of human activities in these dynamic situations. Contemporary tools for the coordination used in the disaster response, such as e-mail, Whiteboards or
Autor:
Ayda Saidane, Massimo Felici, Alessandra Tedeschi, Carlo Riccucci, Paul El-Khoury, Magali Seguran, Nicola Zannone, Yudis Asnar, Keqin Li, Fabio Massacci
Publikováno v:
International Journal of Secure Software Engineering, 2(3), 1-22
Designing secure and dependable IT systems requires a deep analysis of organizational as well as social aspects of the environment where the system will operate. Domain experts and analysts often face security and dependability (S&D) issues they have
Publikováno v:
Artificial Intelligence and Law, 17(1), 1-30. Springer
Artificial Intelligence and Law
Artificial Intelligence and Law, Springer Verlag, 2008, 1, 17, pp.1-30. ⟨10.1007/s10506-008-9067-3⟩
Artificial Intelligence and Law
Artificial Intelligence and Law, Springer Verlag, 2008, 1, 17, pp.1-30. ⟨10.1007/s10506-008-9067-3⟩
International audience; Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose them to implement minimal precautionary security measures. Several IT solutions (e.g., Privacy Enhancing Technolo
Autor:
Yudis Asnar, Fabio Massacci, Ayda Saidane, Carlo Riccucci, Massimo Felici, Alessandra Tedeschi, Paul El-Khoury, Keqin Li, Magali Séguran, Nicola Zannone
Designing secure and dependable IT systems requires a deep analysis of organizational as well as social aspects of the environment where the system will operate. Domain experts and analysts often face security and dependability (S&D) issues they have
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ddecae3b24a515db138078255a708ffa
https://doi.org/10.4018/978-1-4666-2482-5.ch004
https://doi.org/10.4018/978-1-4666-2482-5.ch004
Publikováno v:
On the Move to Meaningful Internet Systems: OTM 2010 ISBN: 9783642169335
OTM Conferences (1)
18th International Conference on Cooperative Information Systems (COOPIS'2010) / OnTheMove (OTM) Conferences
18th International Conference on Cooperative Information Systems (COOPIS'2010) / OnTheMove (OTM) Conferences, Oct 2010, Crete, Greece
OTM Conferences (1)
18th International Conference on Cooperative Information Systems (COOPIS'2010) / OnTheMove (OTM) Conferences
18th International Conference on Cooperative Information Systems (COOPIS'2010) / OnTheMove (OTM) Conferences, Oct 2010, Crete, Greece
International audience; Business process management and systems have been proven mature and highly beneficial in many domains. Recent surveys by leading market analysts say that the next challenge for BPM are unstructured processes. Based on a domain
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0d5da04c6ea031ffc9b00d3b110c1d96
https://doi.org/10.1007/978-3-642-16934-2_15
https://doi.org/10.1007/978-3-642-16934-2_15
A Dynamic Security Framework for Ambient Intelligent Systems: A Smart-Home Based eHealth Application
Publikováno v:
Transactions on Computational Science X ISBN: 9783642174988
Providing context-dependent security services is an important challenge for ambient intelligent systems. The complexity and the unbounded nature of such systems make it difficult even for the most experienced and knowledgeable security engineers, to
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a16301de92e60b04f33eb85d5d5eae90
https://doi.org/10.1007/978-3-642-17499-5_1
https://doi.org/10.1007/978-3-642-17499-5_1
Publikováno v:
SECUREWARE
SECUREWARE, Jun 2009, Athens, Glyfada, Greece. pp.8-14, ⟨10.1109/SECURWARE.2009.9⟩
SECURWARE
SECUREWARE, Jun 2009, Athens, Glyfada, Greece. pp.8-14, ⟨10.1109/SECURWARE.2009.9⟩
SECURWARE
International audience; A security pattern describes a particular recurring securityproblem that arises in specific contexts and presents awell-proven generic solution for it. This paper describes anUntraceable Secret Handshake, a protocol that allow
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e4373b26bc0779f7260dbaa0a8600b2c
https://hal.archives-ouvertes.fr/hal-01437646
https://hal.archives-ouvertes.fr/hal-01437646