Sciweavers

762 search results - page 125 / 153
» Modeling and Simulating Information Security Management
Sort
View
SACMAT
2009
ACM
14 years 10 days ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
CONTEXT
2007
Springer
14 years 1 months ago
Contexts and Ontologies in Schema Matching
Abstract. In this paper, we propose a general model of schema matching based on the following ideas: on the one hand, a schema is viewed as a context (namely as a partial and appro...
Paolo Bouquet
CONTEXT
2007
Springer
14 years 1 months ago
Similarity Measurement in Context
Context plays a crucial role when measuring the similarity of two concepts. Nonetheless, the modelling of context has been mostly neglected in existing similarity measurement theor...
Carsten Keßler
CONCURRENCY
2008
60views more  CONCURRENCY 2008»
13 years 7 months ago
Steering via the image in local, distributed and collaborative settings
Computational steering is a valuable mechanism for scientific investigation in which the parameters of a running program can be altered and the results visualized immediately. In ...
J. D. Wood, H. Wright
ACSAC
2010
IEEE
13 years 5 months ago
Spam mitigation using spatio-temporal reputations from blacklist history
IP blacklists are a spam filtering tool employed by a large number of email providers. Centrally maintained and well regarded, blacklists can filter 80+% of spam without having to...
Andrew G. West, Adam J. Aviv, Jian Chang, Insup Le...