Sciweavers

2270 search results - page 281 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
OOPSLA
1992
Springer
15 years 8 months ago
CACL: Efficient Fine-Grained Protection for Objects
CACL is a protection scheme for objects that offers a simple and flexible model of protection and has an efficient, software-only implementation. The model, based on Access Contro...
Joel E. Richardson, Peter M. Schwarz, Luis-Felipe ...
IADIS
2003
15 years 6 months ago
User Profile Based Smart Information Filtering in Smartcard
Finding effectively relevant information is becoming challenging task. In this paper, we propose a smart information filtering system SIM-Filter that integrates user’s identity ...
Abdelkrim Lahlou, Pascal Urien
ISI
2006
Springer
15 years 4 months ago
Multi-document Summarization for Terrorism Information Extraction
Abstract. Counterterrorism is one of the major challenges to the society. In order to flight again the terrorists, it is very important to have a through understanding of the terro...
Fu Lee Wang, Christopher C. Yang, Xiaodong Shi
ENTCS
2006
158views more  ENTCS 2006»
15 years 4 months ago
Towards a Subject-Oriented Model-Driven Framework
Model-Driven Architecture is an approach of the OMG, its objective is to tackle problems such as: the high availability that a software product requires to be ready for use, the h...
Pablo Amaya, Carlos González, Juan M. Muril...
ICDCS
2006
IEEE
15 years 10 months ago
Dynamic Access Control in a Content-based Publish/Subscribe System with Delivery Guarantees
Content-based publish/subscribe (pub/sub) is a promising paradigm for building asynchronous distributed applications. In many application scenarios, these systems are required to ...
Yuanyuan Zhao, Daniel C. Sturman