Sciweavers

716 search results - page 54 / 144
» Security Requirements Engineering: A Framework for Represent...
Sort
View
CSE
2009
IEEE
14 years 3 months ago
A Framework for Enforcing Constrained RBAC Policies
—Constraints are an important part of role-based access control policies. The safety or security of a system is maintained by enforcing constraints that are specified in the pol...
Jason Crampton, Hemanth Khambhammettu
OOPSLA
2004
Springer
14 years 2 months ago
Transparent proxies for java futures
A proxy object is a surrogate or placeholder that controls access to another target object. Proxies can be used to support distributed programming, lazy or parallel evaluation, ac...
Polyvios Pratikakis, Jaime Spacco, Michael W. Hick...
SP
2008
IEEE
140views Security Privacy» more  SP 2008»
13 years 8 months ago
Knowledge support and automation for performance analysis with PerfExplorer 2.0
The integration of scalable performance analysis in parallel development tools is difficult. The potential size of data sets and the need to compare results from multiple experime...
Kevin A. Huck, Allen D. Malony, Sameer Shende, Ala...
ACL
1992
13 years 10 months ago
The Representation of Multimodal User Interface Dialogues Using Discourse Pegs
The three-tiered discourse representation defined in (Luperfoy, 1991) is applied to multimodal humancomputer interface (HCI) dialogues. In the applied system the three tiers are (...
Susann LuperFoy
IFIP
2009
Springer
14 years 3 months ago
A Policy Model for Secure Information Flow
When a computer program requires legitimate access to confidential data, the question arises whether such a program may illegally reveal sensitive information. This paper proposes...
Adedayo Adetoye, Atta Badii