Sciweavers

1534 search results - page 281 / 307
» Error Reporting Logic
Sort
View
DBSEC
2004
170views Database» more  DBSEC 2004»
13 years 11 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...
JISBD
2001
13 years 11 months ago
Conceptual Modeling of Device-Independent Web Applications
Existing tools intended to build and deploy engaging complex Web sites (including functionality) have shown to be inadequate to face the software production process in an unified a...
Jaime Gómez, Cristina Cachero
WSC
1998
13 years 11 months ago
Using Simulation to Optimize a Horizontal Carousel Storage System
Carousel storage systems are often used to increase storage density, throughput and efficiency while reducing inventory and man-hours. The Hewlett-Packard company has developed a ...
Todd LeBaron, Michael L. Hoffman
BPSC
2009
190views Business» more  BPSC 2009»
13 years 11 months ago
Detective Information Flow Analysis for Business Processes
Abstract: We report on ongoing work towards a posteriori detection of illegal information flows for business processes, focusing on the challenges involved in doing so. Resembling ...
Rafael Accorsi, Claus Wonnemann
CORR
2006
Springer
143views Education» more  CORR 2006»
13 years 9 months ago
A Knowledge-Based Approach for Selecting Information Sources
Through the Internet and the World-Wide Web, a vast number of information sources has become available, which offer information on various subjects by different providers, often i...
Thomas Eiter, Michael Fink, Hans Tompits