Sciweavers

826 search results - page 160 / 166
» What Triggers a Behavior
Sort
View
111
Voted
DBSEC
2004
170views Database» more  DBSEC 2004»
15 years 2 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...
88
Voted
ECIS
2004
15 years 2 months ago
Discourse analysis: making complex methodology simple
Discursive-based analysis of organizations is not new in the field of interpretive social studies. Since not long ago have information systems (IS) studies also shown a keen inter...
Tatyana V. Bondarouk, Huub J. M. Ruël
ICETE
2004
253views Business» more  ICETE 2004»
15 years 2 months ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong
IICAI
2003
15 years 2 months ago
Machine Learning in Infrastructure Security
Abstract: Democratic societies throughout the world, it appears, are facing a new type of threat dubbed "asymmetric threat." In this new threat environment the world gove...
V. Rao Vemuri
125
Voted
COOTS
1997
15 years 2 months ago
MiSFIT: A Tool for Constructing Safe Extensible C++ Systems
The boundary between application and system is becoming increasingly permeable. Extensible applications, such as web browsers, database systems, and operating systems, demonstrate...
Christopher Small