Sciweavers

9231 search results - page 1608 / 1847
» informs 2008
Sort
View
EMS
2008
IEEE
15 years 6 months ago
Threat Modeling Revisited: Improving Expressiveness of Attack
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Drake Patrick Mirembe, Maybin K. Muyeba
ER
2008
Springer
136views Database» more  ER 2008»
15 years 6 months ago
Automating the Extraction of Rights and Obligations for Regulatory Compliance
Abstract. Government regulations are increasingly affecting the security, privacy and governance of information systems in the United States, Europe and elsewhere. Consequently, co...
Nadzeya Kiyavitskaya, Nicola Zeni, Travis D. Breau...
ER
2008
Springer
110views Database» more  ER 2008»
15 years 6 months ago
Conjunctive Query Containment under Access Limitations
Access limitations may occur when querying data sources over the web or heterogeneous data sources presented as relational tables: this happens, for instance, in Data Exchange and ...
Andrea Calì, Davide Martinenghi
ER
2008
Springer
99views Database» more  ER 2008»
15 years 6 months ago
Relaxed Compliance Notions in Adaptive Process Management Systems
The capability to dynamically evolve process models over time and to migrate process instances to a modified model version are fundamental requirements for any process-aware inform...
Stefanie Rinderle-Ma, Manfred Reichert, Barbara We...
ERLANG
2008
ACM
15 years 6 months ago
Testing Erlang data types with quviq quickcheck
When creating software, data types are the basic bricks. Most of the time a programmer will use data types defined in library modules, therefore being tested by many users over ma...
Thomas Arts, Laura M. Castro, John Hughes
« Prev « First page 1608 / 1847 Last » Next »