Sciweavers

597 search results - page 48 / 120
» A Pattern System for Security Requirements Engineering
Sort
View
SACMAT
2010
ACM
13 years 8 months ago
On the definition of role mining
There have been many approaches proposed for role mining. However, the problems solved often differ due to a lack of consensus on the formal definition of the role mining problem....
Mario Frank, Joachim M. Buhmann, David A. Basin
EUC
2007
Springer
13 years 11 months ago
Parallel Network Intrusion Detection on Reconfigurable Platforms
With the wide adoption of internet into our everyday lives, internet security becomes an important issue. Intrusion detection at the network level is an effective way of stopping m...
Chun Xue, Zili Shao, Meilin Liu, Qingfeng Zhuge, E...
PAKDD
2001
ACM
157views Data Mining» more  PAKDD 2001»
14 years 4 days ago
Applying Pattern Mining to Web Information Extraction
Information extraction (IE) from semi-structured Web documents is a critical issue for information integration systems on the Internet. Previous work in wrapper induction aim to so...
Chia-Hui Chang, Shao-Chen Lui, Yen-Chin Wu
SELMAS
2005
Springer
14 years 1 months ago
A Product-Line Approach to Promote Asset Reuse in Multi-agent Systems
Software reuse technologies have been a driving force in significantly reducing both the time and cost of software specification, development, maintenance and evolution. However, t...
Josh Dehlinger, Robyn R. Lutz
SOCO
2008
Springer
13 years 7 months ago
Component-Based Access Control: Secure Software Composition through Static Analysis
Abstract. Extensible Component Platforms support the discovery, installation, starting, uninstallation of components at runtime. Since they are often targeted at mobile resource-co...
Pierre Parrend, Stéphane Frénot