Sciweavers

370 search results - page 35 / 74
» Enforcing Access Control Using Risk Assessment
Sort
View
EMISA
2010
Springer
14 years 8 months ago
Investigating the Process of Process Modeling with Cheetah Experimental Platform
Abstract. When assessing the usability of BPM technologies enterprises have to rely on vendor promises or qualitative data rather than on empirical or experimental research. To add...
Jakob Pinggera, Stefan Zugal, Barbara Weber
ITICSE
1997
ACM
15 years 6 months ago
Computer managed, open question, open book assessment
This paper describes the development and use of practical examinations which include a significant element of software control of the administrative process. The educational metho...
John Rosbottom
ASSETS
2000
ACM
15 years 6 months ago
Neck range of motion and use of computer head controls
Abstract—Head controls provide an alternative means of computer access. This study determined whether neck movement limitations are associated with reduced performance with such ...
Edmund F. LoPresti, David M. Brienza, Jennifer Ang...
SERP
2010
14 years 11 months ago
Towards Automatic Integration of Or-BAC Security Policies Using Aspects
We propose a formal method to automatically integrate security rules regarding an access control policy (expressed in Or-BAC) in Java programs. Given an untrusted application and a...
Yliès Falcone, Mohamad Jaber
BMCBI
2005
101views more  BMCBI 2005»
15 years 1 months ago
MASQOT: a method for cDNA microarray spot quality control
Background: cDNA microarray technology has emerged as a major player in the parallel detection of biomolecules, but still suffers from fundamental technical problems. Identifying ...
Max Bylesjö, Daniel Eriksson, Andreas Sjö...