نتایج جستجو برای: third party

تعداد نتایج: 267981  

2001
Ebru Dincel Nenad Medvidovic André van der Hoek

Software application families and their accompanying architectures (also referred to as product line architectures or PLAs) are a promising area in which the potential of software component reuse can be fully realized. Evolving such application families necessitates making informed architectural decisions. Among industry and research communities, it is recognized that software metrics can provi...

1999
Henri Massias X. Serret Avila Jean-Jacques Quisquater

This paper discusses some of the issues that appear on the creation and use of secure digital timestamps. From the timestamp creation side, it first introduces a review on the existing systems, giving a recommendation for the one we believe is more suitable for the general use. Afterwards, it deals with an extension of the basic scheme in order to be used in the enterprise environments. Finally...

Journal: :CoRR 2016
S. Matthew English Fabrizio Orlandi Sören Auer

Different versions of peer-to-peer electronic cash exist as data represented by separate blockchains. Payments between such systems cannot be sent directly from one party to another without going through a financial institution. Bitcoin provided part of the solution but its utility is limited to intra-blockchain transactions. The benefits are lost if a trusted third party is required to execute...

2009
Rikard Land Daniel Sundmark Frank Lüders Iva Krasteva Adnan Causevic

Software is often built from pre-existing, reusable components, but there is a lack of knowledge regarding how efficient this is in practice. In this paper we therefore present qualitative results from an industrial survey on current practices and preferences, highlighting differences and similarities between development with reusable components, development without reusable components, and dev...

Journal: :Journal of Systems and Software 2011
Claudia P. Ayala Øyvind Hauge Reidar Conradi Xavier Franch Jingyue Li

The success of softwaredevelopment using thirdparty components highly depends on the ability to select a suitable component for the intended application. The evidence shows that there is limited knowledge about current industrial OTS selection practices. As a result, there is often a gap between theory and practice, and the proposedmethods for supporting selection are rarely adopted in the indu...

2007
Jingliang Zhang Lizhen Ma Yumin Wang

A new fair electronic cash system is proposed based on group blind signature and secret sharing scheme. Our proposed system is dynamic: we propose a method to delete the dishonest banks that maybe attack the system, which was not mentioned in the previous literatures. Our proposed scheme does not need a trusted third party to trace users: a shop owning suspicious ecoin and the bank having issue...

2003
Antoni Martínez-Ballesté Francesc Sebé Josep Domingo-Ferrer Miguel Soriano

Fingerprinting schemes allow tracing of illegally redistributed multimedia contents. When using asymmetric fingerprinting, the merchant does not know the marked copy nor the embedded mark, so fraudulent distribution of the content by the merchant –which could lead to framing honest customers– is not possible. A problem with the deployment of classical asymmetric fingerprinting protocols is that...

Journal: :IJMHCI 2011
Donald McMillan Alistair Morrison Matthew Chalmers

When conducting mass participation trials on Apple iOS devices researchers are forced to make a choice between using the Apple App Store or third party software repositories. In order to inform this choice, this paper describes a sample application that was released via both methods along with comparison of user demographics and engagement. The contents of these repositories are examined and co...

Journal: :South African Computer Journal 2002
Frans A. Lategan Martin S. Olivier

No reliable method currently exists to safeguard the privacy of private information. Privacy policies are insufficient as compliance can not be enforced automatically. In this paper we propose a model to improve the control the owner of private information has over its protection. This is achieved by classifying private information based on the purpose it is acquired for, and then designing met...

2004
Luigi Catuogno Pompeo Faruolo Umberto Ferraro Petrillo Ivan Visconti

In the Grid computing model a remote service is provided by a resource owner to a client. The resource owner executes a client job and charges the client for a corresponding fee. In this paper we discuss the main weakness of many existing models for performing such a kind of transaction, i.e., the strong assumption that both the resource owner and the clients are honest. Then, we propose a new ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید