Sciweavers

1177 search results - page 3 / 236
» A Theory of Role Composition
Sort
View
ISI
2004
Springer
13 years 10 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
PVLDB
2008
150views more  PVLDB 2008»
13 years 4 months ago
Privacy preserving serial data publishing by role composition
Previous works about privacy preserving serial data publishing on dynamic databases have relied on unrealistic assumptions of the nature of dynamic databases. In many applications...
Yingyi Bu, Ada Wai-Chee Fu, Raymond Chi-Wing Wong,...
CHI
2005
ACM
14 years 5 months ago
Supporting efficient development of cognitive models at multiple skill levels: exploring recent advances in constraint-based mod
This paper presents X-PRT, a new cognitive modeling tool supporting activities ranging from interface design to basic cognitive research. X-PRT provides a graphical model developm...
Irene Tollinger, Richard L. Lewis, Michael McCurdy...
HICSS
2005
IEEE
149views Biometrics» more  HICSS 2005»
13 years 10 months ago
Web Services Composition with Traceability Centered on Dependency
Web services composition is becoming increasingly important as organizations are now getting ready to provide more complex service-based applications. Contemporary literature on t...
Jong Woo Kim, Radhika Jain