Sciweavers

715 search results - page 20 / 143
» Integration of Access Control in Information Systems: From R...
Sort
View
SAC
2009
ACM
14 years 2 days ago
Towards "WYDIWYS" for MIMI using concept analysis
This paper presents a novel software engineering approach for developing a dynamic web interface that meets the quality criterion of “WYDIWYS” - What You Do Is What You See. T...
Jie Dai, Remo Mueller, Jacek Szymanski, Guo-Qiang ...
EFDBS
2003
13 years 8 months ago
Building platforms for information system interoperability - using a UML-based metamodeling approach
Abstract. Models have been playing a major role in information system engineering and interoperability: in this paper, we put an emphasis on the complementary role of metamodels. M...
Marie-Noëlle Terrasse, Marinette Savonnet, Er...
CCS
2005
ACM
14 years 28 days ago
Control-flow integrity
Current software attacks often build on exploits that subvert machine-code execution. The enforcement of a basic safety property, Control-Flow Integrity (CFI), can prevent such at...
Martín Abadi, Mihai Budiu, Úlfar Erl...
SACMAT
2010
ACM
13 years 5 months ago
Role mining based on weights
Role mining from the existing permissions has been widely applied to aid the process of migrating to an RBAC system. While all permissions are treated evenly in previous approache...
Xiaopu Ma, Ruixuan Li, Zhengding Lu
WWW
2006
ACM
14 years 8 months ago
POLYPHONET: an advanced social network extraction system from the web
Social networks play important roles in the Semantic Web: knowledge management, information retrieval, ubiquitous computing, and so on. We propose a social network extraction syst...
Hideaki Takeda, Junichiro Mori, Kôiti Hasida...