Sciweavers

1103 search results - page 202 / 221
» Semantic Interoperability of Authorizations
Sort
View
IWFM
2003
13 years 10 months ago
Using Admissible Interference to Detect Denial of Service Vulnerabilities
Meadows recently proposed a formal cost-based framework for analysis of denial of service. It was showed how some principles that have already been used to make cryptographic prot...
Stéphane Lafrance, John Mullins
RBAC
1997
234views more  RBAC 1997»
13 years 10 months ago
Comparing simple role based access control models and access control lists
The RBAC metaphor is powerful in its ability to express access control policy in terms of the way in which administrators view organizations. The functionality of simple Role Base...
John F. Barkley
COMPUTING
2006
100views more  COMPUTING 2006»
13 years 8 months ago
Interval Arithmetic with Containment Sets
The idea of containment sets (csets) is due to Walster and Hansen, and the theory is mainly due to the first author. Now that floating point computation with infinities is widely a...
John D. Pryce, George F. Corliss
JIIS
2006
103views more  JIIS 2006»
13 years 8 months ago
Time-focused clustering of trajectories of moving objects
Spatio-temporal, geo-referenced datasets are growing rapidly, and will be more in the near future, due to both technological and social/commercial reasons. From the data mining vie...
Mirco Nanni, Dino Pedreschi
KAIS
2006
102views more  KAIS 2006»
13 years 8 months ago
Visual information extraction
Typographic and visual information is an integral part of textual documents. Most information extraction systems ignore most of this visual information, processing the text as a l...
Yonatan Aumann, Ronen Feldman, Yair Liberzon, Biny...