Sciweavers

325 search results - page 65 / 65
» A taxonomy of information systems applications: The benefits...
Sort
View
CCS
2006
ACM
13 years 9 months ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...
GECCO
2010
Springer
192views Optimization» more  GECCO 2010»
13 years 8 months ago
Resource abundance promotes the evolution of public goods cooperation
Understanding the evolution of cooperation as part of an evolutionary stable strategy (ESS) is a difficult problem that has been the focus of much work. The associated costs of co...
Brian D. Connelly, Benjamin E. Beckmann, Philip K....
CCS
2008
ACM
13 years 7 months ago
Robust defenses for cross-site request forgery
Cross-Site Request Forgery (CSRF) is a widely exploited web site vulnerability. In this paper, we present a new variation on CSRF attacks, login CSRF, in which the attacker forges...
Adam Barth, Collin Jackson, John C. Mitchell
CG
2004
Springer
13 years 5 months ago
Refereed digital publication of computer graphics educational materials
Computer Graphics as a discipline has undergone drastic modifications over the past decades. Indeed the phenomenal progress in both the technical and digital art domains requires ...
Frederico C. Figueiredo, Dena Elisabeth Eber, Joaq...
TASE
2010
IEEE
13 years 1 days ago
Clear and Precise Specification of Ecological Data Management Processes and Dataset Provenance
Abstract--With the availability of powerful computational and communication systems, scientists now readily access large, complicated derived datasets and build on those results to...
Leon J. Osterweil, Lori A. Clarke, Aaron M. Elliso...