Sciweavers

19587 search results - page 3899 / 3918
» Systems Engineering for software Engineers
Sort
View
BALT
2006
14 years 2 months ago
On Ontology, ontologies, Conceptualizations, Modeling Languages, and (Meta)Models
In philosophy, the term ontology has been used since the 17th century to refer both to a philosophical discipline (Ontology with a capital "O"), and as a domain-independe...
Giancarlo Guizzardi
CCS
2006
ACM
14 years 2 months ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...
CCS
2006
ACM
14 years 2 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
FC
2006
Springer
129views Cryptology» more  FC 2006»
14 years 2 months ago
Phoolproof Phishing Prevention
Abstract. Phishing, or web spoofing, is a growing problem: the Anti-Phishing Working Group (APWG) received almost 14,000 unique phishing reports in August 2005, a 56% jump over the...
Bryan Parno, Cynthia Kuo, Adrian Perrig
ICPP
1995
IEEE
14 years 2 months ago
Progress: A Toolkit for Interactive Program Steering
Interactive program steering permits researchers to monitor and guide their applications during runtime. Interactive steering can help make end users more effective in addressing ...
Jeffrey S. Vetter, Karsten Schwan
« Prev « First page 3899 / 3918 Last » Next »