Sciweavers

4445 search results - page 166 / 889
» Reflective Authorization Systems
Sort
View
146
Voted
DBSEC
2004
108views Database» more  DBSEC 2004»
15 years 6 months ago
Why Is this User Asking so Many Questions? Explaining Sequences of Queries
A sequence of queries submitted by a database user within a short period of time may have a single, illuminating explanation. In this paper we consider sequences of single-record q...
Aybar C. Acar, Amihai Motro
140
Voted
ICALT
2006
IEEE
15 years 10 months ago
AWELS: Adaptive Web-Based Education and Learning Styles
Can learning styles (LS) be applied in current webbased systems? What are the main issues when applying LS in web-based systems? Can LS be authored in current web-based systems? W...
Alexandra I. Cristea, Natalia Stash
CEC
2009
IEEE
15 years 11 months ago
Biocybernetic loop: From awareness to evolution
—Developing systems that support people in everyday life in a discrete and effective way is an ultimate goal of a new generation of technical systems. Physiological computing rep...
Nikola B. Serbedzija, Stephen H. Fairclough
ICDCSW
2005
IEEE
15 years 10 months ago
Specifying Information-Flow Controls
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
Howard Chivers, Jeremy Jacob
ACSAC
2001
IEEE
15 years 8 months ago
Application Intrusion Detection using Language Library Calls
Traditionally, intrusion detection systems detect intrusions at the operating system (OS) level. In this paper we explore the possibility of detecting intrusion at the application...
Anita K. Jones, Yu Lin