Sciweavers

1352 search results - page 148 / 271
» Designing Security Requirements Models Through Planning
Sort
View
ECBS
1999
IEEE
138views Hardware» more  ECBS 1999»
14 years 2 months ago
Multi-Domain Surety Modeling and Analysis for High Assurance Systems
Engineering systems are becoming increasingly complex as state of the art technologies are incorporated into designs. Surety modeling and analysis is an emerging science which per...
James Davis, Jason Scott, Janos Sztipanovits, Marc...
WSC
2004
13 years 11 months ago
Educating Middle and High School Students in Space Operations: The Simulation Approach
This paper describes a proposed pilot educational program to teach middle and high school students the space shuttle processing operations. This pilot program involves a partnersh...
Mansooreh Mollaghasemi, Michael Georgiopoulos, Ann...
IUI
1997
ACM
14 years 2 months ago
Helping Users Think in Three Dimensions: Steps Toward Incorporating Spatial Cognition in User Modelling
Historically, efforts at user modelling in educational systems have tended to employ knowledge representations in which symbolic (or "linguistic") cognition is emphasize...
Michael Eisenberg, Ann Nishioka, M. E. Schreiner
SACMAT
2009
ACM
14 years 4 months ago
Ensuring spatio-temporal access control for real-world applications
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anas...
SACMAT
2003
ACM
14 years 3 months ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...