Sciweavers

1352 search results - page 98 / 271
» Designing Security Requirements Models Through Planning
Sort
View
WSC
2008
14 years 11 days ago
Experience in the broadening of a single-purpose simulation model
Simulation models are often developed for a single purpose. However, once a model is accepted by management and other stake-holders, it is quite common and desirable to wish to br...
Reid L. Kress, Pete Bereolos, Karen Bills, James C...
SG
2004
Springer
14 years 3 months ago
A Framework Supporting General Object Interactions for Dynamic Virtual Worlds
Abstract. This work introduces a new interaction framework for dynamic virtual environments. The proposed system is designed to deal with all possible interactions in a virtual wor...
Pieter Jorissen, Wim Lamotte
IADIS
2004
13 years 11 months ago
Preliminary Steps in Designing and Implementing a Privilege Verifier for PMI
We have designed and deployed a system that uses X.509 public-key certificates (PKC) and attribute certificates (AC) for access control. This includes an authorization service for...
Diana Berbecaru, Antonio Lioy
WWW
2010
ACM
14 years 5 months ago
Fine-grained privilege separation for web applications
We present a programming model for building web applications with security properties that can be confidently verified during a security review. In our model, applications are d...
Akshay Krishnamurthy, Adrian Mettler, David Wagner
ICEIS
2003
IEEE
14 years 3 months ago
Live-Representation Process Management
Abstract: We present the live-representation approach for managing and working in complex, dynamic business processes. In this approach, aspects of business-process modeling, proje...
Daniel D. Corkill, Zachary B. Rubinstein, Susan E....