Sciweavers

376 search results - page 26 / 76
» Teaching context in information security
Sort
View
SIGMOD
2004
ACM
116views Database» more  SIGMOD 2004»
14 years 8 months ago
The Role of Cryptography in Database Security
In traditional database security research, the database is usually assumed to be trustworthy. Under this assumption, the goal is to achieve security against external attacks (e.g....
Ueli M. Maurer
IIE
2007
154views more  IIE 2007»
13 years 7 months ago
Computer Aided Modelling Exercises
This paper describes a didactical Computer Aided Software Engineering (CASE)-tool that was developed for use within the context of a course in object-oriented domain modelling. In...
Monique Snoeck, Raf Haesen, Herman Buelens, Manu D...
OOPSLA
2009
Springer
14 years 16 days ago
Good examples for exposing bad practice: a "killer examples" workshop
The “Killer Examples” series of workshops are highly interactive workshops which have been an annual occurrence at OOPSLA since 2002. The goals of the workshop are to bring to...
Dale Skrien, Michael E. Caspersen, Jürgen B&o...
MODELLIERUNG
2008
13 years 9 months ago
Modelling Security Goals in Business Processes
: Various types of security goals, such as authentication or confidentiality, can be defined as policies for process-aware information systems, typically in a manual fashion. There...
Christian Wolter, Michael Menzel, Christoph Meinel
MHCI
2009
Springer
14 years 2 months ago
A context-sensitive security model for privacy protection on mobile phones
In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The...
Julian Seifert, Alexander De Luca, Bettina Conradi