Sciweavers

716 search results - page 74 / 144
» Security Requirements Engineering: A Framework for Represent...
Sort
View
ACSAC
2009
IEEE
14 years 3 months ago
How to Securely Break into RBAC: The BTG-RBAC Model
—Access control models describe frameworks that dictate how subjects (e.g. users) access resources. In the Role-Based Access Control (RBAC) model access to resources is based on ...
Ana Ferreira, David W. Chadwick, Pedro Farinha, Ri...
HICSS
2005
IEEE
132views Biometrics» more  HICSS 2005»
14 years 2 months ago
A Soft Systems Analysis of Social Cognition In Boundary-Spanning Innovation
The term social cognition is used in the psychology and organizational literatures to denote many different manifestations of the mental representations and processes that underli...
Susan Gasson
OOPSLA
2009
Springer
14 years 3 months ago
S.P.L.O.T.: software product lines online tools
This paper introduces S.P.L.O.T., a Web-based reasoning and configuration system for Software Product Lines (SPLs). The system benefits from mature logic-based reasoning techniq...
Marcílio Mendonça, Moises Branco, Do...
IFIPTM
2009
119views Management» more  IFIPTM 2009»
13 years 6 months ago
Detection and Prevention of Insider Threats in Database Driven Web Services
In this paper, we take the first step to address the gap between the security needs in outsourced hosting services and the protection provided in the current practice. We consider ...
Tzvi Chumash, Danfeng Yao
CCS
2007
ACM
14 years 3 months ago
Panorama: capturing system-wide information flow for malware detection and analysis
Malicious programs spy on users’ behavior and compromise their privacy. Even software from reputable vendors, such as Google Desktop and Sony DRM media player, may perform undes...
Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christ...