Sciweavers

Share
ICDIM
2010
IEEE
8 years 1 months ago
Detecting incompleteness in access control policies using data classification schemes
In a set of access control policies, incompleteness is the existence of situations for which no policy applies. Some of these situations can be exploited by attackers, to obtain un...
Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serg...
ICDIM
2010
IEEE
8 years 2 months ago
High-order functions and their ordering relations
High-order functions are the sole elements in a class of recursive functions. The functions are related to each other through application, i.e., applying a function to an argument...
Kevin H. Xu, Jingsong Zhang, Shelby Gao
ICDIM
2010
IEEE
8 years 2 months ago
Simulation integration for healthcare education, training and assessment
Funded as part of the `Network Enabled Platforms' program the Health Services Virtual Organization (HSVO) Project has developed a network-enabled platform (NEP) consisting of...
Rachel H. Ellaway, Jeremy R. Cooperstock, Bruce Sp...
ICDIM
2010
IEEE
8 years 2 months ago
Risk management in dynamic role based access control systems
We present a risk management framework which allows to reason about and manage risk for role based access control systems. The framework expresses essential characteristics of risk...
Ji Ma, Kamel Adi, Luigi Logrippo, Serge Mankovski
ICDIM
2010
IEEE
8 years 2 months ago
Real-time business intelligence system architecture with stream mining
Business Intelligence (BI) capitalized on datamining and analytics techniques for discovering trends and reacting to events with quick decisions. We argued that a new breed of dat...
Yang Hang, Simon Fong
ICDIM
2010
IEEE
8 years 2 months ago
Data mining and automatic OLAP schema generation
Data mining aims at extraction of previously unidentified information from large databases. It can be viewed as an automated application of algorithms to discover hidden patterns a...
Muhammad Usman, Sohail Asghar, Simon Fong
ICDIM
2010
IEEE
8 years 2 months ago
Social network collaborative filtering framework and online trust factors: A case study on Facebook
Recommender systems have been proposed to exploit the potential of social network by filtering the information and offer recommendations to a user that he is predicted to like. Co...
Wei Chen, Simon Fong
ICDIM
2010
IEEE
8 years 2 months ago
Visualizing e-Government portal and its performance in WEBVS
An e-Government portal is responsible to provide news, information and services to citizens, merchants and tourists in a reliable way. Previously, we proposed a Web Monitoring Sys...
Ho Si Meng, Simon Fong
ICDIM
2010
IEEE
8 years 2 months ago
Complementarity of process-oriented and ontology-based context managers to identify situations
One issue for context-aware applications is to identify without delay situations requiring reactions. The identification of these situations is computed from both dynamic context ...
Amel Bouzeghoub, Chantal Taconet, Amina Jarraya, N...
books