Sciweavers

5494 search results - page 957 / 1099
» E-services Management Requirements
Sort
View
109
Voted
CCS
2006
ACM
15 years 4 months ago
Resiliency policies in access control
We introduce the notion of resiliency policies in the context of access control systems. Such policies require an access control system to be resilient to the absence of users. An...
Ninghui Li, Mahesh V. Tripunitara, Qihua Wang
CCS
2006
ACM
15 years 4 months ago
Safety and consistency in policy-based authorization systems
In trust negotiation and other distributed proving systems, networked entities cooperate to form proofs that are justified by collections of certified attributes. These attributes...
Adam J. Lee, Marianne Winslett
CCS
2006
ACM
15 years 4 months ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...
130
Voted
ECOOP
2004
Springer
15 years 4 months ago
A Reflective Approach to Dynamic Software Evolution
In this paper, we present a solution that allows systems to remain active while they are evolving. Our approach goes out from the principle of separated concerns and has two steps....
Peter Ebraert, Tom Tourwé
100
Voted
CIKM
2006
Springer
15 years 4 months ago
CP/CV: concept similarity mining without frequency information from domain describing taxonomies
Domain specific ontologies are heavily used in many applications. For instance, these form the bases on which similarity/dissimilarity between keywords are extracted for various k...
Jong Wook Kim, K. Selçuk Candan