Sciweavers

1597 search results - page 100 / 320
» Mental Models of Computer Security
Sort
View
SAC
2010
ACM
15 years 11 months ago
Towards fine-grained and application-centric access control for wireless sensor networks
The emerging reality of wireless sensor networks deployed as long-lived infrastructure required to serve multiple applications necessitates the development of fine-grained securi...
Nelson Matthys, Syed Rehan Afzal, Christophe Huyge...
CCGRID
2009
IEEE
15 years 11 months ago
GenLM: License Management for Grid and Cloud Computing Environments
—Software license management allows independent software vendors (ISVs) to control the access of their products. It is a fundamental part of the ISVs’ business strategy. A wide...
Mathias Dalheimer, Franz-Josef Pfreundt
121
Voted
SUTC
2006
IEEE
15 years 10 months ago
The Computational Complexity of Enforceability Validation for Generic Access Control Rules
In computer security, many researches have tackled on the possibility of a unified model of access control, which could enforce any access control policies within a single unified...
Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo
WISE
2003
Springer
15 years 9 months ago
Service-Oriented Computing: Concepts, Characteristics and Directions
Service-Oriented Computing (SOC) is the computing paradigm that utilizes services as fundamental elements for developing applications/solutions. To build the service model, SOC re...
Mike P. Papazoglou
CORR
2008
Springer
107views Education» more  CORR 2008»
15 years 4 months ago
A Computational Framework for the Near Elimination of Spreadsheet Risk
We present Risk Integrated's Enterprise Spreadsheet Platform (ESP), a technical approach to the near-elimination of spreadsheet risk in the enterprise computing environment, ...
Yusuf Jafry, Fredrika Sidoroff, Roger Chi