Sciweavers

127 search results - page 9 / 26
» scopes 2005
Sort
View
ICCSA
2005
Springer
14 years 1 months ago
Security Risk Vector for Quantitative Asset Assessment
There are standard risk analysis methodologies like GMITS and ISO17799, but new threats and vulnerabilities appear day by day because the IT organizations, its infrastructure, and ...
Yoon Jung Chung, In-Jung Kim, Namhoon Lee, Taek Le...
ICTCS
2005
Springer
14 years 1 months ago
Checking Risky Events Is Enough for Local Policies
Abstract. An extension of the λ-calculus is proposed to study historybased access control. It allows for parametrized security policies with a possibly nested, local scope. To gov...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
ISI
2005
Springer
14 years 1 months ago
An Ontological Approach to the Document Access Problem of Insider Threat
Verification of legitimate access of documents, which is one aspect of the umbrella of problems in the Insider Threat category, is a challenging problem. This paper describes the r...
Boanerges Aleman-Meza, Phillip Burns, Matthew Eave...
NIME
2005
Springer
215views Music» more  NIME 2005»
14 years 1 months ago
GoingPublik: Using Realtime Global Score Synthesis
This paper takes the reader through various elements of the GoingPublik sound artwork for distributive ensemble and introduces the Realtime Score Synthesis tool (RSS) used as a co...
Arthur Clay, Thomas M. Frey, Jürg Gutknecht
UM
2005
Springer
14 years 29 days ago
A Framework of Context-Sensitive Visualization for User-Centered Interactive Systems
Abstract. This research proposes an adaptive mechanism of information visualizing that responds to context changes in knowledge-intensive work. A framework of Context-Sensitive Vis...
Eui-Chul Jung, Keiichi Sato