Sciweavers

499 search results - page 29 / 100
» An Integrated Model for Access Control and Information Flow ...
Sort
View
INFOCOM
2010
IEEE
13 years 8 months ago
Coupled 802.11 Flows in Urban Channels: Model and Experimental Evaluation
Abstract—Contending flows in multi-hop 802.11 wireless networks compete with two fundamental asymmetries: (i) channel asymmetry, in which one flow has a stronger signal, potent...
Joseph Camp, Ehsan Aryafar, Edward W. Knightly
APSEC
2005
IEEE
14 years 4 months ago
Ontology-based Active Requirements Engineering Framework
Software-intensive systems are systems of systems that rely on complex interdependencies among themselves as well as with their operational environment to satisfy the required beh...
Seok Won Lee, Robin A. Gandhi
USS
2008
14 years 22 days ago
Securing Provenance
Provenance describes how an object came to be in its present state. Intelligence dossiers, medical records and corporate financial reports capture provenance information. Many of ...
Uri Braun, Avraham Shinnar, Margo I. Seltzer
FIDJI
2004
Springer
14 years 3 months ago
Task-Based Access Control for Virtual Organizations
Abstract. GOLD (Grid-based Information Models to Support the Rapid Innovation of New High Value-Added Chemicals) is concerned with the dynamic formation and management of virtual o...
Panos Periorellis, Savas Parastatidis
EPK
2006
118views Management» more  EPK 2006»
13 years 11 months ago
Transformation of Use Cases to EPC Models
: Within the requirements phase of many projects, functional requirements are often documented as Use Cases. Within SOA projects, however, these Use Cases are not sufficient since ...
Daniel Lübke