Sciweavers

1795 search results - page 93 / 359
» Security Models and Information Flow
Sort
View
211
Voted
SIGMOD
2006
ACM
142views Database» more  SIGMOD 2006»
16 years 3 months ago
Model driven development of secure XML databases
In this paper, we propose a methodological approach for the model driven development of secure XML databases (DB). This proposal is within the framework of MIDAS, a model driven m...
Belén Vela, Eduardo Fernández-Medina, Esperanza ...
119
Voted
SACMAT
2003
ACM
15 years 8 months ago
Dependencies and separation of duty constraints in GTRBAC
A Generalized Temporal Role Based Access Control (GTRBAC) model that captures an exhaustive set of temporal constraint needs for access control has recently been proposed. GTRBACâ...
James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Ber...
152
Voted
SICHERHEIT
2010
15 years 1 months ago
A Fuzzy Model for IT Security Investments
: This paper presents a fuzzy set based decision support model for taking uncertainty into account when making security investment decisions for distributed systems. The proposed m...
Guido Schryen
116
Voted
BILDMED
2008
141views Algorithms» more  BILDMED 2008»
15 years 5 months ago
Analysis of Cerebral Blood Flow from Small Rodents
The exact knowledge of the blood vessel geometry plays an important role, not only in clinical applications (stroke diagnosis, detection of stenosis), but also for detailed analysi...
Monika Lehmpfuhl, Manuel André Gaudnek, And...
149
Voted
CAI
2006
Springer
15 years 3 months ago
Formal Verification of Security Model Using SPR Tool
In this paper, formal verification methodologies and the SPR (Safety Problem Resolver) model checking tool are used for verifying a security model's safety. The SPR tool makes...
Il-Gon Kim, Miyoung Kang, Jin-Young Choi, Peter D....