Sciweavers

351 search results - page 45 / 71
» Formalisation and implementation of Access control models
Sort
View
110
Voted
ICSOFT
2007
15 years 1 months ago
Solving Design Issues in Web Meta-Model Approach to Support End-User Development
End-user development is proposed as a solution to the issues business organisations face when developing web applications to support their business processes. We are proposing a me...
Buddhima De Silva, Athula Ginige
ICAIL
2007
ACM
15 years 4 months ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...
101
Voted
IJIEM
2007
113views more  IJIEM 2007»
15 years 13 days ago
Fairness concerns in digital right management models
: Digital piracy is threatening the global multimedia content industry and blindly applied coercive Digital Right Management (DRM) policies do nothing but legitimizing this piracy....
Luc Bouganim, Philippe Pucheral
RTSS
1992
IEEE
15 years 4 months ago
Scheduling Sporadic Tasks with Shared Resources in Hard-Real-Time Systems
The problem of scheduling a set of sporadic tasks that share a set of serially reusable, single unit software resources on a single processor is considered. The correctness condit...
Kevin Jeffay
112
Voted
JSAC
2007
130views more  JSAC 2007»
15 years 12 days ago
Cross-layer QoS Analysis of Opportunistic OFDM-TDMA and OFDMA Networks
Abstract— Performance analysis of multiuser orthogonal frequency division multiplexing (OFDM-TDMA) and orthogonal frequency division multiple access (OFDMA) networks in support o...
Yu-Jung Chang, Feng-Tsun Chien, C. C. Jay Kuo