Sciweavers

2270 search results - page 302 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
ETRA
2010
ACM
178views Biometrics» more  ETRA 2010»
15 years 9 months ago
Biometric identification via an oculomotor plant mathematical model
There has been increased interest in reliable, non-intrusive methods of biometric identification due to the growing emphasis on security and increasing prevalence of identity thef...
Oleg V. Komogortsev, Sampath Jayarathna, Cecilia R...
VLDB
2007
ACM
295views Database» more  VLDB 2007»
15 years 10 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
CODASPY
2011
14 years 8 months ago
Relationship-based access control: protection model and policy language
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates coined the term Relationship-Based Access Control...
Philip W. L. Fong
AIL
2005
99views more  AIL 2005»
15 years 4 months ago
Persuasion Dialogue in Online Dispute Resolution
In this paper we show how dialogue-based theories of argumentation can contribute to the construction of effective systems of dispute resolution. Specifically we consider the role ...
Douglas Walton, David M. Godden
IEEEARES
2009
IEEE
15 years 11 months ago
Web Service Trust: Towards a Dynamic Assessment Framework
— Trust in software services is a key prerequisite for the success and wide adoption of Services-Oriented Computing (SOC) in an open Internet world. However, trust is poorly asse...
George Spanoudakis, Stephane LoPresti