Sciweavers

1357 search results - page 198 / 272
» Controlling Access to Documents: A Formal Access Control Mod...
Sort
View
COMPSAC
2007
IEEE
14 years 3 months ago
An Adaptive Security Model for Multi-agent Systems and Application to a Clinical Trials Environment
We present in this paper an adaptive security model for Multi-agent systems. A security meta-model has been developed in which the traditional role concept has been extended. The ...
Liang Xiao 0002, Andrew Peet, Paul H. Lewis, Srina...
ICC
2007
IEEE
123views Communications» more  ICC 2007»
14 years 3 months ago
Cross-Layer Optimization With Model-Based Parameter Exchange
— Cross-layer optimization (CLO) promises significant gains in comparison to a conventional system design, which does not allow for information exchange across layers. One of th...
Andreas Saul, Shoaib Khan, Gunther Auer, Wolfgang ...
CCS
2008
ACM
13 years 10 months ago
A class of probabilistic models for role engineering
Role Engineering is a security-critical task for systems using role-based access control (RBAC). Different role-mining approaches have been proposed that attempt to automatically ...
Mario Frank, David A. Basin, Joachim M. Buhmann
ICSOFT
2007
13 years 10 months ago
Solving Design Issues in Web Meta-Model Approach to Support End-User Development
End-user development is proposed as a solution to the issues business organisations face when developing web applications to support their business processes. We are proposing a me...
Buddhima De Silva, Athula Ginige
ENTCS
2007
101views more  ENTCS 2007»
13 years 8 months ago
Systems Modelling via Resources and Processes: Philosophy, Calculus, Semantics, and Logic
We describe a programme of research in resource semantics, concurrency theory, bunched logic, and stochastic processes, as applied to mathematical systems modelling. Motivated by ...
David J. Pym, Chris M. N. Tofts