Sciweavers

2270 search results - page 71 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
MMMACNS
2001
Springer
14 years 1 months ago
The Set and Function Approach to Modeling Authorization in Distributed Systems
Abstract. We present a new model that provides clear and precise semantics for authorization. The semantics is independent from underling security mechanisms and is separate from i...
Tatyana Ryutov, B. Clifford Neuman
FUIN
2008
74views more  FUIN 2008»
13 years 8 months ago
Security in a Model for Long-running Transactions
Abstract. Communicating Hierarchical Transaction-based Timed Automata have been introduced to model systems performing long
Damas P. Gruska, Andrea Maggiolo-Schettini, Paolo ...
HICSS
2007
IEEE
139views Biometrics» more  HICSS 2007»
14 years 3 months ago
Physicians' Resistance toward Healthcare Information Technologies: A Dual-Factor Model
This paper proposes and validates a theory of physician resistance toward IT usage by drawing on prior research in the resistance to change literature and a recent dual-factor mod...
Anol Bhattacherjee, Neset Hikmet
AIED
2007
Springer
14 years 2 months ago
Open Learner Models: Opinions of School Education Professionals
This work surveys the opinions of teachers and other education professionals regarding the potential for Open Learner Models (OLM) in UK schools. We describe the aims of OLM, and o...
Alice Kerly, Susan Bull
WMCSA
2002
IEEE
14 years 1 months ago
The Location Stack: A Layered Model for Location in Ubiquitous Computing
Based on five design principles extracted from a survey of location systems, we present the Location Stack, a layered software engineering model for location in ubiquitous comput...
Jeffrey Hightower, Barry Brumitt, Gaetano Borriell...