Sciweavers

894 search results - page 42 / 179
» Scenario-Driven Role Engineering
Sort
View
SACMAT
2010
ACM
14 years 16 hour ago
Mining roles with noisy data
There has been increasing interest in automatic techniques for generating roles for role based access control, a process known as role mining. Most role mining approaches assume t...
Ian Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo...
SACMAT
2009
ACM
14 years 2 months ago
Evaluating role mining algorithms
While many role mining algorithms have been proposed in recent years, there lacks a comprehensive study to compare these algorithms. These role mining algorithms have been evaluat...
Ian Molloy, Ninghui Li, Tiancheng Li, Ziqing Mao, ...
SAC
2006
ACM
13 years 7 months ago
Transforming OCL constraints: a context change approach
Integrity constraints (ICs) play a key role in the definition of conceptual schemas. In the UML, ICs are usually specified as invariants written in the OCL. However, due to the hi...
Jordi Cabot, Ernest Teniente
MMMACNS
2005
Springer
14 years 1 months ago
A Modal Logic for Role-Based Access Control
Making correct access-control decisions is central to security, which in turn requires accounting correctly for the identity, credentials, roles, authority, and privileges of users...
Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Ch...
IJMMS
2007
78views more  IJMMS 2007»
13 years 7 months ago
HCI reality - an 'Unreal Tournament'?
The cooperation between designers, engineers and scientists in the human–computer interaction (HCI) community is often difficult, and can only be explained by investigating the...
Christoph Bartneck, Matthias Rauterberg