Sciweavers

508 search results - page 6 / 102
» A Security Model and its Application to a Distributed Decisi...
Sort
View
SACMAT
2009
ACM
14 years 3 months ago
Ensuring spatio-temporal access control for real-world applications
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anas...
CCS
2010
ACM
14 years 3 months ago
Attribute-based signature and its applications
In an attribute-based signature (ABS), users sign messages with any predicate of their attributes issued from an attribute authority. Under this notion, a signature attests not to...
Jin Li, Man Ho Au, Willy Susilo, Dongqing Xie, Kui...
FTDCS
1999
IEEE
14 years 25 days ago
Supporting Real World Security Models in Java
The Java Security Model has undergone considerable evolution since its initial implementation. However, due to its historical focus on securing machines against attack from hostil...
Ian Welch, Robert J. Stroud
JCP
2007
120views more  JCP 2007»
13 years 8 months ago
Application of Multi-Attribute Decision Making Approach to Learning Management Systems Evaluation
—The article presents an approach to the development of multi-attribute decision making model that is based on DEX, an expert system shell for multi-attribute decision support. W...
Tanja Arh, Borka Jerman-Blazic
MIE
2008
177views Healthcare» more  MIE 2008»
13 years 10 months ago
Process Mining Techniques: an Application to Stroke Care
In a competitive health-care market, hospitals have to focus on ways to streamline their processes in order to deliver high quality care while at the same time reducing costs. To a...
Ronny Mans, Helen Schonenberg, Giorgio Leonardi, S...