Sciweavers

151 search results - page 14 / 31
» On Testing for Absence of Rights in Access Control Models
Sort
View
ACSW
2006
13 years 8 months ago
A method for access authorisation through delegation networks
Owners of systems and resources usually want to control who can access them. This must be based on having a process for authorising certain parties, combined with mechanisms for e...
Audun Jøsang, Dieter Gollmann, Richard Au
OTM
2005
Springer
14 years 27 days ago
Balancing Flexibility and Security in Adaptive Process Management Systems
Abstract. Process–aware information systems (PAIS) must provide sufficient flexibility to their users to support a broad spectrum of application scenarios. As a response to thi...
Barbara Weber, Manfred Reichert, Werner Wild, Stef...
ICECCS
1997
IEEE
114views Hardware» more  ICECCS 1997»
13 years 11 months ago
An approach to integration testing based on architectural descriptions
Software architectures can play a role in improving the testing process of complex systems. In particular, descriptions of the software architecture can be useful to drive integra...
Antonia Bertolino, Paola Inverardi, Henry Muccini,...
DRM
2005
Springer
14 years 28 days ago
Fairer usage contracts for DRM
DRM has been widely promoted as a means to enforce copyright. In many previous papers, it has been argued that DRM gives too much power to rights holders and actually goes beyond ...
Alapan Arnab, Andrew Hutchison
IJMMS
2008
115views more  IJMMS 2008»
13 years 7 months ago
Control centric approach in designing scrolling and zooming user interfaces
The dynamic systems approach to the design of continuous interaction interfaces allows the designer to use simulations, and analytical tools to analyse the behaviour and stability...
Parisa Eslambolchilar, Roderick Murray-Smith