Sciweavers

1140 search results - page 134 / 228
» A Purpose-Based Access Control Model
Sort
View
MODELLIERUNG
2008
13 years 9 months ago
Modelling Security Goals in Business Processes
: Various types of security goals, such as authentication or confidentiality, can be defined as policies for process-aware information systems, typically in a manual fashion. There...
Christian Wolter, Michael Menzel, Christoph Meinel
WEBI
2004
Springer
14 years 1 months ago
Mining Local Data Sources For Learning Global Cluster Models
— Distributed data mining has recently caught a lot of attention as there are many cases where pooling distributed data for mining is probibited, due to either huge data volume o...
Chak-Man Lam, Xiaofeng Zhang, William Kwok-Wai Che...
DBSEC
2001
129views Database» more  DBSEC 2001»
13 years 9 months ago
Secure Role-Based Workflow Models
: In this paper we introduce a series of reference models for Secure Role-Based Workflow systems. We build our models over the well-known RBAC96 framework. 96 model supports the no...
Savith Kandala, Ravi S. Sandhu
IFIP
1993
Springer
14 years 1 days ago
Customization and Evolution of Process Models in EPOS
EPOS is a kernel software engineering environment, o ering integrated software con guration and process management. The EPOS process modeling PM support system runs on top of th...
Reidar Conradi, Maria Letizia Jaccheri
CN
2006
161views more  CN 2006»
13 years 8 months ago
A multimedia traffic modeling framework for simulation-based performance evaluation studies
The emergence of high-speed communication systems has enabled the support of complex multimedia applications. The traffic patterns generated by such applications are likely to be ...
Assen Golaup, Hamid Aghvami