Sciweavers

1781 search results - page 121 / 357
» An Emerging Need for a New Software Engineering Method
Sort
View
120
Voted
SOFTWARE
2008
15 years 18 days ago
What Do We Know about Developer Motivation?
s of titles and abstracts) as irrelevant to our focus. We read the remaining 519 papers in full to establish our final list. The 92 papers we chose were originally published in the...
Tracy Hall, Helen Sharp, Sarah Beecham, Nathan Bad...
94
Voted
COMSWARE
2007
IEEE
15 years 7 months ago
RAT: Routing by Adaptive Targeting in Wireless Sensor/Actor Networks
— Wireless sensor networks have attracted significant interest for various scientific, military, and e-health applications. Recently a new class of sensor networks “sensor/ac...
Ghalib A. Shah, Muslim Bozyigit, Demet Aksoy
103
Voted
ICFEM
2003
Springer
15 years 5 months ago
A Z Based Approach to Verifying Security Protocols
Abstract. Security protocols preserve essential properties, such as confidentiality and authentication, of electronically transmitted data. However, such properties cannot be dire...
Benjamin W. Long, Colin J. Fidge, Antonio Cerone
104
Voted
SAC
2008
ACM
15 years 5 days ago
A cost-driven approach to role engineering
In recent years role-based access control (RBAC) has been spreading within organizations. However, companies still have considerable difficulty migrating to this model, due to the...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
FASE
2010
Springer
14 years 10 months ago
A Verifiable Modeling Approach to Configurable Role-Based Access Control
Role-based access control (RBAC) is a popular access control model for enterprise systems due to its economic benefit and scalability. There are many RBAC features available, each ...
Dae-Kyoo Kim, Lunjin Lu, Sangsig Kim