Sciweavers

2446 search results - page 435 / 490
» Polyadic Concept Analysis
Sort
View
ACSAC
2009
IEEE
13 years 6 months ago
RoleVAT: Visual Assessment of Practical Need for Role Based Access Control
Abstract--Role based access control (RBAC) is a powerful security administration concept that can simplify permission assignment management. Migration to and maintenance of RBAC re...
Dana Zhang, Kotagiri Ramamohanarao, Steven Verstee...
ASIAN
2009
Springer
269views Algorithms» more  ASIAN 2009»
13 years 6 months ago
Noninterference with Dynamic Security Domains and Policies
Abstract. Language-based information flow analysis is used to statically examine a program for information flows between objects of different security domains, and to verify these ...
Robert Grabowski, Lennart Beringer
ICWSM
2009
13 years 6 months ago
Trust Incident Account Model: Preliminary Indicators for Trust Rhetoric and Trust or Distrust in Blogs
This paper defines a concept of trust incident accounts as verbal reports of empirical episodes in which a trustor has reached a state of positive or negative expectations of a tr...
Victoria L. Rubin
IEEECGIV
2009
IEEE
13 years 6 months ago
TagReel: A Visualization of Tag Relations among User Interests in the Social Tagging System
Social tagging systems provide users with the ability to share information and extend their field of knowledge. The purpose of this paper is to explore the tag relations of user in...
Joohee Bae, Kyungwon Lee
CORR
2010
Springer
221views Education» more  CORR 2010»
13 years 6 months ago
Reduction of Feature Vectors Using Rough Set Theory for Human Face Recognition
In this paper we describe a procedure to reduce the size of the input feature vector. A complex pattern recognition problem like face recognition involves huge dimension of input ...
Debotosh Bhattacharjee, Dipak Kumar Basu, Mita Nas...