Sciweavers

1147 search results - page 20 / 230
» Transformation of Access Rights
Sort
View
CORR
2008
Springer
52views Education» more  CORR 2008»
13 years 8 months ago
Weighted distance transforms generalized to modules and their computation on point lattices
This paper presents the generalization of weighted distances to modules and their computation through the chamfer algorithm on general point lattices. The first part is dedicated ...
Céline Fouard, Robin Strand, Gunilla Borgef...
PRL
2006
117views more  PRL 2006»
13 years 8 months ago
Non-iterative generalized low rank approximation of matrices
: As an extension to 2DPCA, Generalized Low Rank Approximation of Matrices (GLRAM) applies two-sided (i.e., the left and right) rather than single-sided (i.e., the left or the righ...
Jun Liu, Songcan Chen
ACSAC
2000
IEEE
14 years 7 days ago
Dynamic Access Control through Petri Net Workflows
Access control is an important protection mechanism for information systems. An access control matrix grants subjects privileges to objects. Today, access control matrices are sta...
Konstantin Knorr
ICICS
2005
Springer
14 years 2 months ago
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a f...
Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili...
TSE
2008
128views more  TSE 2008»
13 years 8 months ago
Analyzing Regulatory Rules for Privacy and Security Requirements
Information practices that use personal, financial, and health-related information are governed by US laws and regulations to prevent unauthorized use and disclosure. To ensure com...
Travis D. Breaux, Annie I. Antón