Sciweavers

716 search results - page 64 / 144
» Security Requirements Engineering: A Framework for Represent...
Sort
View
BMCBI
2004
154views more  BMCBI 2004»
13 years 8 months ago
Computation of elementary modes: a unifying framework and the new binary approach
Background: Metabolic pathway analysis has been recognized as a central approach to the structural analysis of metabolic networks. The concept of elementary (flux) modes provides ...
Julien Gagneur, Steffen Klamt
IACR
2011
105views more  IACR 2011»
12 years 8 months ago
Leakage Tolerant Interactive Protocols
We put forth a framework for expressing security requirements from interactive protocols in the presence of arbitrary leakage. This allows capturing different levels of leakage to...
Nir Bitansky, Ran Canetti, Shai Halevi
HIKM
2006
ACM
14 years 2 months ago
Epoch: an ontological framework to support clinical trials management
The increasing complexity of clinical trials has generated an enormous requirement for knowledge and information specification at all stages of the trials, including planning, doc...
Ravi D. Shankar, Susana B. Martins, Martin J. O'Co...
SACMAT
2010
ACM
13 years 9 months ago
On the definition of role mining
There have been many approaches proposed for role mining. However, the problems solved often differ due to a lack of consensus on the formal definition of the role mining problem....
Mario Frank, Joachim M. Buhmann, David A. Basin
ACSAC
2009
IEEE
13 years 6 months ago
RoleVAT: Visual Assessment of Practical Need for Role Based Access Control
Abstract--Role based access control (RBAC) is a powerful security administration concept that can simplify permission assignment management. Migration to and maintenance of RBAC re...
Dana Zhang, Kotagiri Ramamohanarao, Steven Verstee...