Sciweavers

626 search results - page 42 / 126
» Analysing Security Requirements of Information Systems Using...
Sort
View
APWEB
2008
Springer
13 years 10 months ago
Protecting Information Sharing in Distributed Collaborative Environment
Abstract. Information sharing on distributed collaboration usually occurs in broad, highly dynamic network-based environments, and formally accessing the resources in a secure mann...
Min Li, Hua Wang
ACSAC
2003
IEEE
14 years 22 days ago
Scalable and Efficient PKI for Inter-Organizational Communication
We propose an efficient and flexible system for a secure and authentic data exchange in a multiinstitutional environment, where the institutions maintain different databases and p...
Arne Ansper, Ahto Buldas, Margus Freudenthal, Jan ...
BIS
2007
173views Business» more  BIS 2007»
13 years 10 months ago
Natural Language Technology for Information Integration in Business Intelligence
Business intelligence requires the collecting and merging of information from many different sources, both structured and unstructured, in order to analyse for example financial ...
Diana Maynard, Horacio Saggion, Milena Yankova, Ka...
CCS
2004
ACM
14 years 2 months ago
KNOW Why your access was denied: regulating feedback for usable security
We examine the problem of providing useful feedback about access control decisions to users while controlling the disclosure of the system’s security policies. Relevant feedback...
Apu Kapadia, Geetanjali Sampemane, Roy H. Campbell
CC
2006
Springer
108views System Software» more  CC 2006»
14 years 24 days ago
Efficient Flow-Sensitive Interprocedural Data-Flow Analysis in the Presence of Pointers
This paper presents a new worklist algorithm that significantly speeds up a large class of flow-sensitive data-flow analyses, including typestate error checking and pointer analysi...
Teck Bok Tok, Samuel Z. Guyer, Calvin Lin