Sciweavers

45 search results - page 6 / 9
» Integrating Security Patterns into the Electronic Invoicing ...
Sort
View
SACMAT
2003
ACM
15 years 2 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
93
Voted
ICCD
2002
IEEE
257views Hardware» more  ICCD 2002»
15 years 6 months ago
Requirements for Automotive System Engineering Tools
The requirements to system and software development tools brought up by the automotive industry differ from the requirements that other customers have. The important catchwords he...
Joachim Schlosser
SAC
2004
ACM
15 years 3 months ago
Towards a flexible, process-oriented IT architecture for an integrated healthcare network
Healthcare information systems play an important role in improving healthcare quality. As providing healthcare increasingly changes from isolated treatment episodes towards a cont...
Mario Beyer, Klaus Kuhn, Christian Meiler, Stefan ...
CPHYSICS
2007
65views more  CPHYSICS 2007»
14 years 9 months ago
Plasma etching and feature evolution of organic low-k material by using VicAddress
Plasma process is a highly selective technique exploiting the individual or mixed function of positive ions, electrons, neutral radicals, and photons produced by low temperature p...
T. Makabe, T. Shimada, T. Yagisawa
74
Voted
SAC
2009
ACM
15 years 2 months ago
Taking total control of voting systems: firmware manipulations on an optical scan voting terminal
The firmware of an electronic voting machine is typically treated as a “trusted” component of the system. Consequently, it is misconstrued to be vulnerable only to an insider...
Seda Davtyan, Sotiris Kentros, Aggelos Kiayias, La...