Sciweavers

2847 search results - page 464 / 570
» The Context-Dependent Role Model
Sort
View
TRUST
2010
Springer
15 years 5 months ago
A Pairing-Based DAA Scheme Further Reducing TPM Resources
Direct Anonymous Attestation (DAA) is an anonymous signature scheme designed for anonymous attestation of a Trusted Platform Module (TPM) while preserving the privacy of the devic...
Ernie Brickell, Jiangtao Li
78
Voted
ACSAC
2002
IEEE
15 years 5 months ago
A Financial Institution's Legacy Mainframe Access Control System in Light of the Proposed NIST RBAC Standard
In this paper we describe a mainframe access control system (DENT) and its associated delegated administration tool (DSAS) that were used in a financial institution for over 20 y...
Andrew D. Marshall
85
Voted
COMPSAC
2002
IEEE
15 years 5 months ago
Quantitative Aspects of Requirements Evolution
Requirements Evolution is considered one of the most critical issues in developing computer-based systems. Despite the recognised role of requirements in Software Engineering, Req...
Stuart Anderson, Massimo Felici
90
Voted
COMPSAC
2002
IEEE
15 years 5 months ago
An Architecture-Based Approach for Component-Oriented Development
Component-based reuse is a hopeful solution to the software crisis. Research on software architecture (SA) has revealed a component-based vision of the gross structure of software...
Feng Chen, Qianxiang Wang, Hong Mei, Fuqing Yang
97
Voted
HICSS
2002
IEEE
85views Biometrics» more  HICSS 2002»
15 years 5 months ago
Just What Do the Youth of Today Want? Technology Appropriation by Young People
What do young people want from information and communication technology? Why do they adopt some technologies but reject others? What roles do mobile technologies play in their liv...
Jenny M. Carroll, Steve Howard, Frank Vetere, Jane...