Sciweavers

425 search results - page 61 / 85
» Audit
Sort
View
MM
2003
ACM
235views Multimedia» more  MM 2003»
14 years 24 days ago
Active capture: automatic direction for automatic movies
The Active Capture demonstration is part of a new computational media production paradigm that transforms media production from a manual mechanical process into an automated compu...
Marc Davis, Jeffrey Heer, Ana Ramirez
ICADL
2003
Springer
149views Education» more  ICADL 2003»
14 years 23 days ago
Approximating Fair Use in LicenseScript
Current rights management systems are not able to enforce copyright laws because of both legal and technological reasons. The contract rights granted by a copyright owner are often...
Cheun Ngen Chong, Sandro Etalle, Pieter H. Hartel,...
DEON
2010
Springer
14 years 10 days ago
Value-Based Argumentation for Justifying Compliance
Compliance is often achieved ‘by design’ through a coherent system of controls consisting of information systems and procedures . This system-based control requires a new appro...
Brigitte Burgemeestre, Joris Hulstijn, Yao-Hua Tan
POLICY
2001
Springer
13 years 12 months ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
RAID
2001
Springer
13 years 12 months ago
Accurately Detecting Source Code of Attacks That Increase Privilege
Host-based Intrusion Detection Systems (IDS) that rely on audit data exhibit a delay between attack execution and attack detection. A knowledgeable attacker can use this delay to d...
Robert K. Cunningham, Craig S. Stevenson