Sciweavers

762 search results - page 116 / 153
» Modeling and Simulating Information Security Management
Sort
View
ATAL
2005
Springer
14 years 1 months ago
Access control with safe role assignment for mobile agents
Mobile agent systems provide new perspectives for distributed e-commerce applications. Sea-of-Data (SoD) applications are those that need to process huge quantities of distributed...
Guillermo Navarro, Joan Borrell, Jose A. Ortega-Ru...
MOBISYS
2008
ACM
14 years 7 months ago
Behavioral detection of malware on mobile handsets
A novel behavioral detection framework is proposed to detect mobile worms, viruses and Trojans, instead of the signature-based solutions currently available for use in mobile devi...
Abhijit Bose, Xin Hu, Kang G. Shin, Taejoon Park
CONTEXT
2007
Springer
14 years 1 months ago
Adaptive and Context-aware Scenarios for Technology Enhanced Learning System based on a Didactical Theory and a Hierarchical Tas
Among the main issues of future technology-enhanced learning systems, we can mention the following ones: the ability to reuse learning resources (learning objects, tools and servic...
Jean-Louis Tetchueng, Serge Garlatti, Sylvain Laub...
SAC
2006
ACM
13 years 7 months ago
Transformation of yEPC business process models to YAWL
Model transformations are frequently applied in business process modeling to bridge between languages on a different abstraction and formality. In this paper, we define a transfor...
Jan Mendling, Michael Moser, Gustaf Neumann
JODS
2007
138views Data Mining» more  JODS 2007»
13 years 7 months ago
A Formal Framework for Adaptive Access Control Models
Abstract. For several reasons enterprises are frequently subject to organizational change. Respective adaptations may concern business processes, but also other components of an en...
Stefanie Rinderle, Manfred Reichert