Sciweavers

5254 search results - page 893 / 1051
» The Evaluation of Courses in Information Systems
Sort
View
SCHULE
2007
Springer
15 years 7 months ago
Anwenden und Verstehen des Internets - eine Erprobung im Informatikunterricht
: In diesem Beitrag geht es um die Erprobung eines Unterrichtskonzepts zum Thema „Strukturen des Internets“, die Teil eines größeren Forschungsprojekts ist. Das Ziel ist die ...
S. Freischlad
SACMAT
2006
ACM
15 years 7 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
CODES
2005
IEEE
15 years 7 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
ASPLOS
2004
ACM
15 years 7 months ago
FAB: building distributed enterprise disk arrays from commodity components
This paper describes the design, implementation, and evaluation of a Federated Array of Bricks (FAB), a distributed disk array that provides the reliability of traditional enterpr...
Yasushi Saito, Svend Frølund, Alistair C. V...
CCS
2006
ACM
15 years 5 months ago
Resiliency policies in access control
We introduce the notion of resiliency policies in the context of access control systems. Such policies require an access control system to be resilient to the absence of users. An...
Ninghui Li, Mahesh V. Tripunitara, Qihua Wang