Sciweavers

1458 search results - page 200 / 292
» Extended Term Rewriting Systems
Sort
View
CCS
2009
ACM
16 years 1 months ago
Logging key assurance indicators in business processes
Management of a modern enterprise is based on the assumption that executive reports of lower-layer management are faithful to what is actually happening in the field. As some well...
Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin
105
Voted
SACMAT
2009
ACM
15 years 7 months ago
Foundations for group-centric secure information sharing models
We develop the foundations for a theory of Group-Centric Secure Information Sharing (g-SIS), characterize a specific family of models in this arena and identify several direction...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...
98
Voted
DESRIST
2009
Springer
125views Education» more  DESRIST 2009»
15 years 5 months ago
An empirical evaluation of information security awareness levels in designing secure business processes
Information Systems Security (ISS) is critical to ensuring the integrity and credibility of digitally exchanged information in business processes. Information systems development ...
Fergle D'Aubeterre, Lakshmi S. Iyer, Rahul Singh
CASES
2001
ACM
15 years 4 months ago
A system-on-a-chip lock cache with task preemption support
Intertask/interprocess synchronization overheads may be significant in a multiprocessor-shared memory System-on-a-Chip implementation. These overheads are observed in terms of loc...
Bilge Saglam Akgul, Jaehwan Lee, Vincent John Moon...
104
Voted
HT
2009
ACM
15 years 4 months ago
Four measures for the dynamics of coalitions in social networks
We introduce four measures for the change of coalitions in social networks. The first one measures the change of the agents in the network over time, The second one measures the ...
Guido Boella, Leendert van der Torre, Serena Villa...