Sciweavers

2270 search results - page 77 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
ASWC
2006
Springer
13 years 10 months ago
A Semantic Search Conceptual Model and Application in Security Access Control
Abstract. We propose a conceptual model for semantic search and implement it in security access control. The model provides security access control to extend the search capabilitie...
Kunmei Wen, Zhengding Lu, Ruixuan Li, Xiaolin Sun,...
HIS
2001
13 years 10 months ago
An Automated Report Generation Tool for the Data Understanding Phase
To successfully prepare and model data, the data miner needs to be aware of the properties of the data manifold. In this chapter, the outline of a tool for automatically generating...
Juha Vesanto, Jaakko Hollmén
HICSS
2011
IEEE
247views Biometrics» more  HICSS 2011»
13 years 15 days ago
Model-Driven Development Meets Security: An Evaluation of Current Approaches
Although our society is critically dependent on software systems, these systems are mainly secured by protection mechanisms during operation instead of considering security issues...
Kresimir Kasal, Johannes Heurix, Thomas Neubauer
IEEEARES
2008
IEEE
14 years 3 months ago
Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC Systems
Emerging models for context-aware role-based access control pose challenging requirements over policy administration. In this paper we address the issues raised by the decentraliz...
Maria Luisa Damiani, Claudio Silvestri, Elisa Bert...
CASSIS
2004
Springer
14 years 2 months ago
Modelling Mobility Aspects of Security Policies
Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increa...
Pieter H. Hartel, Pascal van Eck, Sandro Etalle, R...