Sciweavers

1352 search results - page 148 / 271
» Designing Security Requirements Models Through Planning
Sort
View
158
Voted
ECBS
1999
IEEE
138views Hardware» more  ECBS 1999»
15 years 7 months ago
Multi-Domain Surety Modeling and Analysis for High Assurance Systems
Engineering systems are becoming increasingly complex as state of the art technologies are incorporated into designs. Surety modeling and analysis is an emerging science which per...
James Davis, Jason Scott, Janos Sztipanovits, Marc...
130
Voted
WSC
2004
15 years 4 months ago
Educating Middle and High School Students in Space Operations: The Simulation Approach
This paper describes a proposed pilot educational program to teach middle and high school students the space shuttle processing operations. This pilot program involves a partnersh...
Mansooreh Mollaghasemi, Michael Georgiopoulos, Ann...
IUI
1997
ACM
15 years 7 months ago
Helping Users Think in Three Dimensions: Steps Toward Incorporating Spatial Cognition in User Modelling
Historically, efforts at user modelling in educational systems have tended to employ knowledge representations in which symbolic (or "linguistic") cognition is emphasize...
Michael Eisenberg, Ann Nishioka, M. E. Schreiner
130
Voted
SACMAT
2009
ACM
15 years 10 months ago
Ensuring spatio-temporal access control for real-world applications
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anas...
140
Voted
SACMAT
2003
ACM
15 years 8 months ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...