Sciweavers

1005 search results - page 158 / 201
» Information systems security engineering: a critical compone...
Sort
View
GECCO
2004
Springer
119views Optimization» more  GECCO 2004»
14 years 2 months ago
Learning Environment for Life Time Value Calculation of Customers in Insurance Domain
A critical success factor in Insurance business is its ability to use information sources and contained knowledge in the most effective way. Its profitability is obtained through t...
Andrea Tettamanzi, Luca Sammartino, Mikhail Simono...
WWW
2010
ACM
14 years 3 months ago
Object views: fine-grained sharing in browsers
Browsers do not currently support the secure sharing of JavaScript objects between principals. We present this problem as the need for object views, which are consistent and contr...
Leo A. Meyerovich, Adrienne Porter Felt, Mark S. M...
SACMAT
2006
ACM
14 years 2 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
ADBIS
2005
Springer
138views Database» more  ADBIS 2005»
14 years 2 months ago
Software Quality and Life Cycles
Abstract. Quality of software has growing role of the modern software engineering work. Typical current trends in the development process are the dominating role of quality systems...
Hannu Jaakkola, Bernhard Thalheim
ICSE
2005
IEEE-ACM
14 years 9 months ago
An architects guide to enterprise application integration with J2EE and .NET
Architects are faced with the problem of building enterprise scale information systems, with streamlined, automated internal business processes and web-enabled business functions,...
Ian Gorton, Anna Liu