Sciweavers

3193 search results - page 572 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
PDP
2002
IEEE
14 years 1 months ago
Scalable Monitoring and Configuration Tools for Grids and Clusters
We present the Ka-admin project that addresses the problem of collecting, visualizing and feeding back any grid information, trace or snapshot, compliant to an XML-like model. Rea...
Philippe Augerat, Cyrill Martin, Benhur Stein
ITCC
2000
IEEE
14 years 1 months ago
Towards Knowledge Discovery from WWW Log Data
As the result of interactions between visitors and a web site, an http log file contains very rich knowledge about users on-site behaviors, which, if fully exploited, can better c...
Feng Tao, Fionn Murtagh
ECIS
2004
13 years 10 months ago
Measurement of user-perceived web quality
Web sites are now considered an extension of the entire business, not just an additional channel or storefront or a simple information portal for the company. Creating an effectiv...
Ravi T. Seethamraju
IEEECIT
2010
IEEE
13 years 7 months ago
Research on PID Control Algorithm of BP Network based on Two Axis Digital Control Turntable
under the research context of two axis digital control turntable, this paper has set up a mathematical model of control system of turntables. Proceeding from such model, it has ma...
Jie Hao, Wenxiang Zhang, Mingqing Ling
ICDE
2007
IEEE
164views Database» more  ICDE 2007»
14 years 3 months ago
Multi-session Separation of Duties (MSoD) for RBAC
Separation of duties (SoD) is a key security requirement for many business and information systems. Role Based Access Controls (RBAC) is a relatively new paradigm for protecting i...
David W. Chadwick, Wensheng Xu, Sassa Otenko, Roma...