Sciweavers

1995 search results - page 122 / 399
» A model for information technologies that can be creative
Sort
View
ICISS
2005
Springer
14 years 2 months ago
VTrust: A Trust Management System Based on a Vector Model of Trust
Abstract. Trust can be used to measure our confidence that a secure system behaves as expected. We had previously proposed a vector model of trust [1]. In this work we address the...
Indrajit Ray, Sudip Chakraborty, Indrakshi Ray
COOPIS
2004
IEEE
14 years 20 days ago
Making Workflow Models Sound Using Petri Net Controller Synthesis
More and more companies use "process aware" information systems to make their business processes more efficient. To do this, workflow definitions must be formulated in a ...
Juliane Dehnert, Armin Zimmermann
INAP
2001
Springer
14 years 1 months ago
Towards Reconciling Use Cases via Controlled Language and Graphical Models
Abstract. In requirements engineering use cases are employed to describe the ow of events and the occurrence of states in a future information system. Use cases consist of a set of...
Kathrin Böttger, Rolf Schwitter, Diego Moll&a...
CIKM
2007
Springer
14 years 3 months ago
Latent semantic fusion model for image retrieval and annotation
This paper studies the effect of Latent Semantic Analysis (LSA) on two different tasks: multimedia document retrieval (MDR) and automatic image annotation (AIA). The contributio...
Trong-Ton Pham, Nicolas Maillot, Joo-Hwee Lim, Jea...
WETICE
2008
IEEE
14 years 3 months ago
On the Modeling of Bell-LaPadula Security Policies Using RBAC
The Bell-LaPadula security model is a hybrid model that combines mandatory access controls and discretionary access controls. The Bell-LaPadula security model has been widely acce...
Gansen Zhao, David W. Chadwick