Sciweavers

756 search results - page 2 / 152
» The role data model revisited
Sort
View
ICWL
2009
Springer
13 years 3 months ago
Addressing Learning Style Criticism: The Unified Learning Style Model Revisited
Abstract. Learning style is one of the individual differences that play an important but controversial role in the learning process. This paper aims at providing a critical analysi...
Elvira Popescu
SACMAT
2003
ACM
13 years 11 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
COMAD
2008
13 years 7 months ago
The Efficient Maintenance of Access Roles with Role Hiding
Role-based access control (RBAC) has attracted considerable research interest. However, the computational issues of RBAC models are yet to be thoroughly studied. In this paper, we...
Chaoyi Pang, Xiuzhen Zhang, Yanchun Zhang, Kotagir...
EMS
2008
IEEE
13 years 7 months ago
Threat Modeling Revisited: Improving Expressiveness of Attack
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Drake Patrick Mirembe, Maybin K. Muyeba
CAISE
2009
Springer
13 years 9 months ago
The Problem of Transitivity of Part-Whole Relations in Conceptual Modeling Revisited
Abstract. Parthood is a relation of fundamental importance in a number of disciplines including cognitive science, linguistics and conceptual modeling. However, one classical probl...
Giancarlo Guizzardi