Sciweavers

371 search results - page 60 / 75
» Template Based Semantic Similarity for Security Applications
Sort
View
93
Voted
SIGSOFT
2005
ACM
15 years 10 months ago
Reasoning about confidentiality at requirements engineering time
Growing attention is being paid to application security at requirements engineering time. Confidentiality is a particular subclass of security concerns that requires sensitive inf...
Renaud De Landtsheer, Axel van Lamsweerde
SACMAT
2010
ACM
15 years 2 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
SP
2000
IEEE
110views Security Privacy» more  SP 2000»
15 years 2 months ago
LOMAC: Low Water-Mark Integrity Protection for COTS Environments
We hypothesize that a form of kernel-resident accesscontrol-based integrity protection can gain widespread acceptance in Commercial Off-The-Shelf (COTS) environments provided that...
Timothy Fraser
ECML
2001
Springer
15 years 2 months ago
Mining the Web for Synonyms: PMI-IR versus LSA on TOEFL
Abstract. This paper presents a simple unsupervised learning algorithm for recognizing synonyms, based on statistical data acquired by querying a Web search engine. The algorithm, ...
Peter D. Turney
WWW
2008
ACM
15 years 10 months ago
Pivotbrowser: a tag-space image searching prototype
We propose a novel iterative searching and refining prototype for tagged images. This prototype, named PivotBrowser, captures semantically similar tag sets in a structure called p...
Xiaoyan Li, Lidan Shou, Gang Chen, Xiaolong Zhang,...