Sciweavers

227 search results - page 23 / 46
» Towards OLAP Security Design - Survey and Research Issues
Sort
View
WETICE
2003
IEEE
14 years 29 days ago
Software Security Checklist for the Software Life Cycle
A formal approach to security in the software life cycle is essential to protect corporate resources. However, little thought has been given to this aspect of software development...
David P. Gilliam, Thomas L. Wolfe, Joseph S. Sheri...
COMSIS
2007
80views more  COMSIS 2007»
13 years 7 months ago
"Security of Computer Systems and Networks" Book Preview
This paper presents preview of the new book titled “Security of Computer Systems and Networks” (original in Serbian language “Sigurnost računarskih sistema i mreža”) – ...
Dragan Pleskonjic, Nemanja Macek, Borislav Djordje...
ATAL
2011
Springer
12 years 7 months ago
GUARDS: game theoretic security allocation on a national scale
Building on research previously reported at AAMAS conferences, this paper describes an innovative application of a novel gametheoretic approach for a national scale security deplo...
James Pita, Milind Tambe, Christopher Kiekintveld,...
SOUPS
2006
ACM
14 years 1 months ago
An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench
Today organizations do not have good ways of linking their written privacy policies with the implementation of those policies. To assist organizations in addressing this issue, ou...
Carolyn Brodie, Clare-Marie Karat, John Karat
IIE
2006
108views more  IIE 2006»
13 years 7 months ago
Towards the Information Society - the Case of Finnnish Teacher Education
Abstract. The use of Information and Communication Technology (ICT) in education is one important competence that student teacher should develop in their academic studies. To be ca...
Johani Rautopuro, Susanna Pöntinen, Jari Kukk...