Sciweavers

5475 search results - page 179 / 1095
» Model Driven Security
Sort
View
133
Voted
IADIS
2003
15 years 5 months ago
Learning Objects: Are They Serving Practitioners Working with VLES?
The purpose of this paper is to present a high-level discussion based on ongoing research with the aim of providing support to educational practitioners based on real shareability...
Miguel Baptista Nunes, Robert Pasley, Maggie McPhe...
CCS
2008
ACM
15 years 5 months ago
Stale-safe security properties for group-based secure information sharing
Attribute staleness arises due to the physical distribution of authorization information, decision and enforcement points. This is a fundamental problem in virtually any secure di...
Ram Krishnan, Jianwei Niu, Ravi S. Sandhu, William...
ECMDAFA
2006
Springer
91views Hardware» more  ECMDAFA 2006»
15 years 7 months ago
Using a Model Merging Language for Reconciling Model Versions
A difficult challenge in the industrialisation of Model-Driven Development is managing different versions of models. Different versions may arise at any time during the development...
Klaus-D. Engel, Richard F. Paige, Dimitrios S. Kol...
136
Voted
ICMCS
2006
IEEE
187views Multimedia» more  ICMCS 2006»
15 years 9 months ago
Combined Gesture-Speech Analysis and Speech Driven Gesture Synthesis
Multimodal speech and speaker modeling and recognition are widely accepted as vital aspects of state of the art human-machine interaction systems. While correlations between speec...
Mehmet Emre Sargin, Oya Aran, Alexey Karpov, Ferda...
137
Voted
SEC
1997
15 years 4 months ago
A formal model to aid documenting and harmonizing of information security requirements
A formal top down model shall be presented to aid documentation and harmonization of information security requirements. The model formalizes layered development of inn security, w...
Jussipekka Leiwo, Yuliang Zheng