Sciweavers

129 search results - page 2 / 26
» Guidelines for designing IT security management tools
Sort
View
AIIA
2003
Springer
13 years 9 months ago
Applying Artificial Intelligence to Clinical Guidelines: The GLARE Approach
In this paper, we present GLARE, a domain-independent system for acquiring, representing and executing clinical guidelines. GLARE is characterized by the adoption of Artificial Int...
Paolo Terenziani, Stefania Montani, Alessio Bottri...
ISSE
2006
13 years 5 months ago
Security Analysis and Configuration of Large Networks
Providing and managing security for large networked systems is difficult because their size and complexity makes manual design and management nearly impossible. Current security m...
Antonio Lioy
SAICSIT
2009
ACM
13 years 11 months ago
A lightweight methodology to improve web accessibility
This paper introduces a methodology to improve the accessibility of websites with the use of free so-called automatic tools. The methodology has three iterative phases, namely ass...
Mardé Greeff, Paula Kotzé
SOUPS
2005
ACM
13 years 10 months ago
Usable security and privacy: a case study of developing privacy management tools
Privacy is a concept which received relatively little attention during the rapid growth and spread of information technology through the 1980’s and 1990’s. Design to make info...
Carolyn Brodie, Clare-Marie Karat, John Karat, Jin...
SAC
2009
ACM
14 years 2 days ago
agentTool process editor: supporting the design of tailored agent-based processes
This paper describes the agentTool Process Editor (APE), an Eclipse plug-in based on the Eclipse Process Framework. The aim of APE is to facilitate the design, verification, and m...
Juan C. García-Ojeda, Scott A. DeLoach, Rob...