Sciweavers

6167 search results - page 1180 / 1234
» Can Refinement be Automated
Sort
View
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
14 years 4 months ago
Apply Model Checking to Security Analysis in Trust Management
Trust management is a form of access control that uses delegation to achieve scalability beyond a single organization or federation. However, delegation can be difficult to contr...
Mark Reith, Jianwei Niu, William H. Winsborough
IEEEARES
2007
IEEE
14 years 4 months ago
Formalising Dynamic Trust Negotiations in Decentralised Collaborative e-Health Systems
Access control in decentralised collaborative systems present huge challenges especially where many autonomous entities including organisations, humans, software agents from diff...
Oluwafemi Ajayi, Richard O. Sinnott, Anthony Stell
IJCNN
2007
IEEE
14 years 4 months ago
Agnostic Learning versus Prior Knowledge in the Design of Kernel Machines
Abstract— The optimal model parameters of a kernel machine are typically given by the solution of a convex optimisation problem with a single global optimum. Obtaining the best p...
Gavin C. Cawley, Nicola L. C. Talbot
KBSE
2007
IEEE
14 years 4 months ago
Tools for model-based security engineering: models vs. code
We present tools to support model-based security engineering on both the model and the code level. In the approach supported by these tools, one firstly specifies the securitycr...
Jan Jürjens, Yijun Yu
LICS
2007
IEEE
14 years 4 months ago
A computable approach to measure and integration theory
We introduce a computable framework for Lebesgue’s measure and integration theory in the spirit of domain theory. For an effectively given second countable locally compact Hausd...
Abbas Edalat
« Prev « First page 1180 / 1234 Last » Next »