Sciweavers

39 search results - page 2 / 8
» A First Step Towards the Automatic Generation of Security Pr...
Sort
View
WWW
2005
ACM
14 years 6 months ago
Automating metadata generation: the simple indexing interface
In this paper, we focus on the development of a framework for automatic metadata generation. The first step towards this framework is the definition of an Application Programmer I...
Kris Cardinaels, Michael Meire, Erik Duval
WCRE
2000
IEEE
13 years 9 months ago
Next Generation Data Interchange: Tool-to-Tool Application Program Interfaces
Data interchange in the form of a standard exchange format(SEF) is only a first step towards tool interoperability. Inter-tool communication using files is slow and cumbersome; a ...
Susan Elliott Sim
SAC
2010
ACM
14 years 6 days ago
Ontology-based generation of IT-security metrics
Legal regulations and industry standards require organizations to measure and maintain a specified IT-security level. Although several IT-security metrics approaches have been de...
Stefan Fenz
ICALT
2009
IEEE
14 years 3 days ago
Concept Extraction from Student Essays, Towards Concept Map Mining
This paper presents a new approach for automatic concept extraction, using grammatical parsers and Latent Semantic Analysis. The methodology and tool used to build the benchmarkin...
Jorge J. Villalón, Rafael A. Calvo
I3E
2001
196views Business» more  I3E 2001»
13 years 6 months ago
Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications
: Designing security-critical systems correctly is very difficult. We present work on software engineering of security critical systems, supported by the CASE tool AUTOFOCUS. Secur...
Jan Jürjens, Guido Wimmel