Sciweavers

376 search results - page 25 / 76
» Teaching context in information security
Sort
View
IJKL
2008
106views more  IJKL 2008»
13 years 8 months ago
Activity- and taxonomy-based knowledge representation framework
: Elaborations of Competence-based Knowledge Space Theory (CbKST) incorporate skills that refer to the conceptual information of the domain as well as to the activities learners ar...
Birgit Marte, Christina M. Steiner, Jürgen He...
BPSC
2009
190views Business» more  BPSC 2009»
13 years 9 months ago
Detective Information Flow Analysis for Business Processes
Abstract: We report on ongoing work towards a posteriori detection of illegal information flows for business processes, focusing on the challenges involved in doing so. Resembling ...
Rafael Accorsi, Claus Wonnemann
ICDIM
2006
IEEE
14 years 2 months ago
Exposing Web Services to Business Partners: Security and Quality of Service Issue
— Delivering QoS and ensuring security of Web Services (WS) based architecture is critical and constitutes a significant challenge because of its dynamic and unpredictable nature...
Yann Le Blevec, Chirine Ghedira, Djamal Benslimane...
CHI
2007
ACM
14 years 8 months ago
Effects of presenting geographic context on tracking activity between cameras
A common video surveillance task is to keep track of people moving around the space being monitored. It is often difficult to track activity between cameras because locations such...
Andreas Girgensohn, Frank M. Shipman III, Thea Tur...
REFSQ
2010
Springer
13 years 9 months ago
Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations
[Context and motivation] The increasing demand of software systems to process and manage sensitive information has led to the need that software systems should comply with relevant...
Shareeful Islam, Haralambos Mouratidis, Stefan Wag...