Sciweavers

15 search results - page 3 / 3
» Enterprise Wrappers for Information Assurance
Sort
View
NSPW
2006
ACM
13 years 11 months ago
E-Prime for security: a new security paradigm
This paper details a true and striking paradigm shift: the use of E-Prime for (at least) user-centered security, organizational/enterprise security policies and informal security ...
Steven J. Greenwald
ADC
2009
Springer
175views Database» more  ADC 2009»
13 years 12 months ago
Conditional Purpose Based Access Control Model for Privacy Protection
This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited p...
Md. Enamul Kabir, Hua Wang
QUATIC
2007
IEEE
13 years 11 months ago
MPS Model-Based Software Acquisition Process Improvement in Brazil
This paper describes an initiative to improve software acquisition process in Brazil. This initiative was conducted in the context of the MPS.BR Program, a nationwide effort to de...
Kival Chaves Weber, Eratostenes Edson Ramalho de A...
EUC
2007
Springer
13 years 11 months ago
Obligations for Privacy and Confidentiality in Distributed Transactions
Existing access control systems are typically unilateral in that the enterprise service provider assigns the access rights and makes the access control decisions, and there is no n...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
ACSW
2006
13 years 6 months ago
Grid-JQA: grid Java based quality of service management by active database
Task scheduling is an integrated component of computing. With the emergence of grid and ubiquitous computing, newer challenges have arisen in task scheduling. Unlike traditional p...
Leili Mohammad Khanli, Morteza Analoui