Sciweavers

2847 search results - page 464 / 570
» The Context-Dependent Role Model
Sort
View
TRUST
2010
Springer
14 years 2 months ago
A Pairing-Based DAA Scheme Further Reducing TPM Resources
Direct Anonymous Attestation (DAA) is an anonymous signature scheme designed for anonymous attestation of a Trusted Platform Module (TPM) while preserving the privacy of the devic...
Ernie Brickell, Jiangtao Li
ACSAC
2002
IEEE
14 years 2 months ago
A Financial Institution's Legacy Mainframe Access Control System in Light of the Proposed NIST RBAC Standard
In this paper we describe a mainframe access control system (DENT) and its associated delegated administration tool (DSAS) that were used in a financial institution for over 20 y...
Andrew D. Marshall
COMPSAC
2002
IEEE
14 years 2 months ago
Quantitative Aspects of Requirements Evolution
Requirements Evolution is considered one of the most critical issues in developing computer-based systems. Despite the recognised role of requirements in Software Engineering, Req...
Stuart Anderson, Massimo Felici
COMPSAC
2002
IEEE
14 years 2 months ago
An Architecture-Based Approach for Component-Oriented Development
Component-based reuse is a hopeful solution to the software crisis. Research on software architecture (SA) has revealed a component-based vision of the gross structure of software...
Feng Chen, Qianxiang Wang, Hong Mei, Fuqing Yang
HICSS
2002
IEEE
85views Biometrics» more  HICSS 2002»
14 years 2 months ago
Just What Do the Youth of Today Want? Technology Appropriation by Young People
What do young people want from information and communication technology? Why do they adopt some technologies but reject others? What roles do mobile technologies play in their liv...
Jenny M. Carroll, Steve Howard, Frank Vetere, Jane...