Sciweavers

422 search results - page 10 / 85
» Risk management for distributed authorization
Sort
View
MSR
2006
ACM
14 years 1 months ago
A lightweight approach to technical risk estimation via probabilistic impact analysis
An evolutionary development approach is increasingly commonplace in industry but presents increased difficulties in risk management, for both technical and organizational reasons...
Robert J. Walker, Reid Holmes, Ian Hedgeland, Pune...
PLDI
2006
ACM
14 years 1 months ago
Specifying distributed trust management in LolliMon
We propose the monadic linear logic programming language LolliMon as a new foundation for the specification of distributed trust management systems, particularly the RT framework...
Jeff Polakow, Christian Skalka
CONCURRENCY
2008
104views more  CONCURRENCY 2008»
13 years 7 months ago
PERMIS: a modular authorization infrastructure
Authorization infrastructures manage privileges and render access control decisions, allowing applications to adjust their behavior according to the privileges allocated to users....
David W. Chadwick, Gansen Zhao, Sassa Otenko, Roma...
MM
2003
ACM
161views Multimedia» more  MM 2003»
14 years 19 days ago
An affinity-based image retrieval system for multimedia authoring and presentation
In this demonstration, we present an image retrieval system to support multimedia authoring and presentation. An affinity-based mechanism, Markov Model Mediator (MMM), is used as ...
Shu-Ching Chen, Mei-Ling Shyu, Na Zhao, Chengcui Z...
ISORC
2003
IEEE
14 years 20 days ago
Metrics and Models for Cost and Quality of Component-Based Software
Quality and risk concerns currently limit the application of commercial off-the-shelf (COTS) software components to non-critical applications. Software metrics can quantify factor...
Sahra Sedigh-Ali, Arif Ghafoor, Raymond A. Paul