Sciweavers

2009 search results - page 289 / 402
» A privacy-aware access control system
Sort
View
ICSE
2003
IEEE-ACM
14 years 10 months ago
RUPi - A Unified Process that Integrates Human-Computer Interaction and Software Engineering
This research has the main objective of presenting a study on the areas of Human-Computer Interaction (HCI) and Software Engineering (SE), focusing on the importance of integratin...
Kênia Soares Sousa, Elizabeth Furtado
ESOP
2010
Springer
14 years 7 months ago
Enforcing Stateful Authorization and Information Flow Policies in Fine
Proving software free of security bugs is hard. Languages that ensure that programs correctly enforce their security policies would help, but, to date, no security-typed language h...
Nikhil Swamy, Juan Chen and Ravi Chugh
ICMLA
2009
14 years 7 months ago
Statistical Decision Making for Authentication and Intrusion Detection
User authentication and intrusion detection differ from standard classification problems in that while we have data generated from legitimate users, impostor or intrusion data is s...
Christos Dimitrakakis, Aikaterini Mitrokotsa
CIDM
2009
IEEE
14 years 4 months ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder
GLOBECOM
2009
IEEE
14 years 4 months ago
On Analyzing the Capacity of WDM PONs
—By taking advantage of the multiple wavelength provisioning capability, WDM PON dramatically enlarges its capacity as compared to TDM PON. The capacity of a WDM PON system depen...
Jingjing Zhang, Nirwan Ansari