Sciweavers

2351 search results - page 8 / 471
» A Method of Requirement Inconsistency Analysis
Sort
View
83
Voted
IEEEARES
2010
IEEE
15 years 4 months ago
Strategies for Reducing Risks of Inconsistencies in Access Control Policies
—Managing access control policies is a complex task. We argue that much of the complexity is unnecessary and mostly due to historical reasons. There are number of legacy policy s...
Bernard Stepien, Stan Matwin, Amy P. Felty
JUCS
2000
119views more  JUCS 2000»
14 years 9 months ago
Use of E-LOTOS in Adding Formality to UML
: E-LOTOS, a new version of the ISO standard specification language LOTOS, is currently being developed. We describe how it can be used to give a formal meaning to, and to discover...
Robert G. Clark, Ana M. D. Moreira
SEC
2008
14 years 11 months ago
ASTRA : A Security Analysis Method Based on Asset Tracking
ASTRA is a security analysis method based on the systematic collection and analysis of security relevant information to detect inconsistencies and assess residual risks. ASTRA can ...
Daniel Le Métayer, Claire Loiseaux
92
Voted
BMCBI
2005
144views more  BMCBI 2005»
14 years 9 months ago
Redefinition of Affymetrix probe sets by sequence overlap with cDNA microarray probes reduces cross-platform inconsistencies in
Background: Comparison of data produced on different microarray platforms often shows surprising discordance. It is not clear whether this discrepancy is caused by noisy data or b...
Scott L. Carter, Aron C. Eklund, Brigham H. Mecham...
INFFUS
2006
85views more  INFFUS 2006»
14 years 9 months ago
Fusionplex: resolution of data inconsistencies in the integration of heterogeneous information sources
Fusionplex is a system for integrating multiple heterogeneous and autonomous information sources that uses data fusion to resolve factual inconsistencies among the individual sour...
Amihai Motro, Philipp Anokhin