Sciweavers

50 search results - page 9 / 10
» Creating Objects in the Flexible Authorization Framework
Sort
View
ML
2002
ACM
123views Machine Learning» more  ML 2002»
13 years 5 months ago
Feature Generation Using General Constructor Functions
Most classification algorithms receive as input a set of attributes of the classified objects. In many cases, however, the supplied set of attributes is not sufficient for creatin...
Shaul Markovitch, Dan Rosenstein
BIS
2009
168views Business» more  BIS 2009»
13 years 6 months ago
Defining Adaptation Constraints for Business Process Variants
Abstract. In current dynamic business environment, it has been argued that certain characteristics of ad-hocism in business processes are desirable. Such business processes typical...
Ruopeng Lu, Shazia Wasim Sadiq, Guido Governatori,...
ACSAC
2009
IEEE
14 years 11 days ago
How to Securely Break into RBAC: The BTG-RBAC Model
—Access control models describe frameworks that dictate how subjects (e.g. users) access resources. In the Role-Based Access Control (RBAC) model access to resources is based on ...
Ana Ferreira, David W. Chadwick, Pedro Farinha, Ri...
HT
1993
ACM
13 years 9 months ago
Designing Dexter-Based Cooperative Hypermedia Systems
This paper discusses issues for the design of a Dexter-based cooperative hypermedia architecture and a specific system, DeVise Hypermedia (DHM), developed from this architecture. ...
Kaj Grønbæk, Jens A. Hem, Ole Lehrman...
CHI
2006
ACM
14 years 6 months ago
Answering why and why not questions in user interfaces
Modern applications such as Microsoft Word have many automatic features and hidden dependencies that are frequently helpful but can be mysterious to both novice and expert users. ...
Brad A. Myers, David A. Weitzman, Andrew Jensen Ko...