Sciweavers

1239 search results - page 157 / 248
» Generating Web Applications from Use Case Scenarios
Sort
View
151
Voted
SACMAT
2006
ACM
15 years 9 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
254
Voted
ASUNAM
2011
IEEE
14 years 3 months ago
MultiAspectForensics: Pattern Mining on Large-Scale Heterogeneous Networks with Tensor Analysis
—Modern applications such as web knowledge base, network traffic monitoring and online social networks have made available an unprecedented amount of network data with rich type...
Koji Maruhashi, Fan Guo, Christos Faloutsos
150
Voted
IJNSEC
2011
145views more  IJNSEC 2011»
14 years 10 months ago
Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points
In this paper, cyclic elliptic curves of the form y2 + xy = x3 + ax2 + b, a, b ∈ GF(2m ) with order M is considered in the design of a Symmetric Key Image Encryption Scheme with...
S. V. Sathyanarayana, M. Aswatha Kumar, K. N. Hari...
115
Voted
IEEESCC
2009
IEEE
15 years 1 months ago
QoS-Enabled Business-to-Business Integration Using ebBP to WS-BPEL Translations
Business-To-Business Integration (B2Bi) is a key mechanism for enterprises to gain competitive advantage. However, developing B2Bi applications is far from trivial. Inter alia, ag...
Andreas Schönberger, Thomas Benker, Stefan Fr...
200
Voted
SIGMOD
2005
ACM
100views Database» more  SIGMOD 2005»
16 years 3 months ago
Events on the edge
The emergence of large-scale receptor-based systems has enabled applications to execute complex business logic over data generated from monitoring the physical world. An important...
Shariq Rizvi, Shawn R. Jeffery, Sailesh Krishnamur...