Sciweavers

211 search results - page 10 / 43
» Modeling security as a dependability attribute: a refinement...
Sort
View
EUSFLAT
2007
121views Fuzzy Logic» more  EUSFLAT 2007»
13 years 9 months ago
Modeling the Context in Multi-Criteria Decision Analysis
In Multiple Criteria Decision Analysis, the preferences of the decision maker regarding each criterion are classically modelled by a utility function depending on one single varia...
Christophe Labreuche
MMMACNS
2010
Springer
13 years 6 months ago
Group-Centric Models for Secure and Agile Information Sharing
Abstract. To share information and retain control (share-but-protect) is a classic cyber security problem for which effective solutions continue to be elusive. Where the patterns o...
Ravi S. Sandhu, Ram Krishnan, Jianwei Niu, William...
CCS
2006
ACM
13 years 11 months ago
Safety analysis of usage control authorization models
The usage control (UCON) model was introduced as a unified approach to capture a number of extensions for traditional access control models. While the policy specification flexibi...
Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Pre...
DEXAW
2003
IEEE
99views Database» more  DEXAW 2003»
14 years 26 days ago
A Model for Context-dependent Access Control for Web-based Services with Role-based Approach
Controlling access to resources is one of the most important protection goals for web-based services in practice. In general, access control requires identification of subjects t...
Ruben Wolf, Thomas Keinz, Markus Schneider
ICDM
2007
IEEE
122views Data Mining» more  ICDM 2007»
14 years 1 months ago
Noise Modeling with Associative Corruption Rules
This paper presents an active learning approach to the problem of systematic noise inference and noise elimination, specifically the inference of Associated Corruption (AC) rules...
Yan Zhang, Xindong Wu