Sciweavers

1645 search results - page 263 / 329
» Conceptual modelling: Knowledge acquisition and model abstra...
Sort
View
ACISP
2008
Springer
15 years 4 months ago
Advanced Permission-Role Relationship in Role-Based Access Control
Abstract. Permission-role assignment is an important issue in rolebased access control (RBAC). There are two types of problems that may arise in permission-role assignment. One is ...
Min Li, Hua Wang, Ashley W. Plank, Jianming Yong
INFOCOM
2007
IEEE
15 years 4 months ago
Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information
Abstract—We propose a novel algorithm for detecting wormhole attacks in wireless multi-hop networks. The algorithm uses only connectivity information to look for forbidden substr...
Ritesh Maheshwari, Jie Gao, Samir R. Das
ADAPTIVE
2007
Springer
15 years 4 months ago
Data Mining for Web Personalization
Abstract. In this chapter we present an overview of Web personalization process viewed as an application of data mining requiring support for all the phases of a typical data minin...
Bamshad Mobasher
ISW
2007
Springer
15 years 3 months ago
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension
Abstract. We study the provable security of identity-based (ID-based) key agreement protocols. Although several published protocols have been proven secure in the random oracle mod...
Sherman S. M. Chow, Kim-Kwang Raymond Choo
MLG
2007
Springer
15 years 3 months ago
Abductive Stochastic Logic Programs for Metabolic Network Inhibition Learning
Abstract. We revisit an application developed originally using Inductive Logic Programming (ILP) by replacing the underlying Logic Program (LP) description with Stochastic Logic Pr...
Jianzhong Chen, Stephen Muggleton, Jose Santos