Sciweavers

352 search results - page 50 / 71
» The usage of stochastic processes in embedded system specifi...
Sort
View
DBSEC
2006
115views Database» more  DBSEC 2006»
13 years 10 months ago
Creating Objects in the Flexible Authorization Framework
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not ...
Nicola Zannone, Sushil Jajodia, Duminda Wijesekera
RE
2008
Springer
13 years 8 months ago
Examining the Relationships between Performance Requirements and "Not a Problem" Defect Reports
Missing or imprecise requirements can lead stakeholders to make incorrect assumptions. A "Not a Problem" defect report (NaP) describes a software behavior that a stakeho...
Chih-Wei Ho, Laurie Williams, Brian Robinson
WORDS
2005
IEEE
14 years 2 months ago
An RBAC Framework for Time Constrained Secure Interoperation in Multi-domain Environments
In emerging e-commerce applications, time constrained information sharing between different systems is becoming a common phenomenon. A flexible and efficient mechanism is needed t...
Smithi Piromruen, James B. D. Joshi
MC
2001
140views Computer Science» more  MC 2001»
13 years 10 months ago
Cooperative model production in systems design to support knowledge management
The computer support of cooperation and knowledge production across socially distributed activity systems has become an important topic in the context of the discourse on ,,knowle...
Christoph Clases
AICOM
2005
91views more  AICOM 2005»
13 years 8 months ago
Multiagent systems for cardiac pacing simulation and control
Abstract. Simulating and controlling physiological phenomena are complex tasks to tackle. This is due to the fact that physiological processes are usually described by a set of par...
Francesco Amigoni, Alessandro Beda, Nicola Gatti