Sciweavers

102 search results - page 17 / 21
» Engineering of Role Permission Assignments
Sort
View
ACSAC
2009
IEEE
14 years 2 months ago
How to Securely Break into RBAC: The BTG-RBAC Model
—Access control models describe frameworks that dictate how subjects (e.g. users) access resources. In the Role-Based Access Control (RBAC) model access to resources is based on ...
Ana Ferreira, David W. Chadwick, Pedro Farinha, Ri...
DSRT
2005
IEEE
14 years 1 months ago
A Simple Distributed Simulation Architecture for Emergency Response Exercises
This paper describes a simple distributed simulation for support of emergency response exercises. The simulation, called the Immersive Synthetic Environment for Exercises (ISEE), ...
Dennis McGrath, Amy Hunt, Marion Bates
PROFES
2004
Springer
14 years 25 days ago
Using Software Inspection as a Catalyst for SPI in a Small Company
Process improvement activities in small and medium size enterprises (SME) are challenging due to small number of personnel and projects, people have to perform in a variety of role...
Lasse Harjumaa, Ilkka Tervonen, Pekka Vuorio
COMPSAC
2009
IEEE
14 years 6 days ago
Temporally Robust Software Features for Authorship Attribution
Authorship attribution is used to determine the creator of works among many candidates, playing a vital role in software forensics, authorship disputes and academic integrity inve...
Steven Burrows, Alexandra L. Uitdenbogerd, Andrew ...
PLDI
2003
ACM
14 years 22 days ago
Automatically proving the correctness of compiler optimizations
We describe a technique for automatically proving compiler optimizations sound, meaning that their transformations are always semantics-preserving. We first present a domainspeci...
Sorin Lerner, Todd D. Millstein, Craig Chambers