Sciweavers

2763 search results - page 113 / 553
» The Dangerous 'All' in Specifications
Sort
View
ICFEM
2009
Springer
13 years 7 months ago
Graded-CTL: Satisfiability and Symbolic Model Checking
In this paper we continue the study of a strict extension of the Computation Tree Logic, called graded-CTL, recently introduced by the same authors. This new logic augments the sta...
Alessandro Ferrante, Margherita Napoli, Mimmo Pare...
IEEEARES
2010
IEEE
14 years 4 months ago
Strategies for Reducing Risks of Inconsistencies in Access Control Policies
—Managing access control policies is a complex task. We argue that much of the complexity is unnecessary and mostly due to historical reasons. There are number of legacy policy s...
Bernard Stepien, Stan Matwin, Amy P. Felty
SIGUCCS
2003
ACM
14 years 2 months ago
A simple web content management tool as the solution to a web site redesign
Before embarking upon a large web site project, whether creating a new site or just redesigning one, it is generally accepted practice not to begin work until all the problem spec...
David Thomas Dudek, Heidi A. Wieczorek
ACMICEC
2008
ACM
262views ECommerce» more  ACMICEC 2008»
13 years 11 months ago
Preventing information leakage between collaborating organisations
Information sharing and protection against leakage is a critical problem especially for organisations having sensitive information. Sharing content between individuals in the same...
Muntaha Alawneh, Imad M. Abbadi
FLAIRS
2006
13 years 10 months ago
Cognitive Simulation in Virtual Patients
We present an overview of the Virtual Patient project at the University of Maryland, which is developing a cognitive model of humans experiencing various states of health and dise...
Sergei Nirenburg, Marjorie McShane, Stephen Beale,...