Sciweavers

1795 search results - page 237 / 359
» Security Models and Information Flow
Sort
View
143
Voted
ISI
2007
Springer
15 years 9 months ago
An LDA-based Community Structure Discovery Approach for Large-Scale Social Networks
Abstract— Community discovery has drawn significant research interests among researchers from many disciplines for its increasing application in multiple, disparate areas, inclu...
Haizheng Zhang, Baojun Qiu, C. Lee Giles, Henry C....
106
Voted
ICISS
2005
Springer
15 years 9 months ago
VTrust: A Trust Management System Based on a Vector Model of Trust
Abstract. Trust can be used to measure our confidence that a secure system behaves as expected. We had previously proposed a vector model of trust [1]. In this work we address the...
Indrajit Ray, Sudip Chakraborty, Indrakshi Ray
135
Voted
WCCE
2001
105views Education» more  WCCE 2001»
15 years 5 months ago
Designing an IT College
: The University of the United Arab Emirates (UAEU) commissioned an international panel of experts to devise a model curriculum for their new College of Information Technology. The...
Peter J. Denning, Ravi Athale, Nada Dabbagh, Danie...
135
Voted
SAC
2005
ACM
15 years 9 months ago
An attribute-based access matrix model
In traditional access control models like MAC, DAC, and RBAC, authorization decisions are determined according to identities of subjects and objects, which are authenticated by a ...
Xinwen Zhang, Yingjiu Li, Divya Nalla
157
Voted
SACMAT
2003
ACM
15 years 8 months ago
An access control model for dynamic client-side content
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...
Adam Hess, Kent E. Seamons