Search
Now showing items 1261-1270 of 1325
Social access control language (SocACL)
(
Association for Computing Machinery
, 2013 , Conference Paper)
Online Social Networks hold vast amounts of readily accessible personal information leaving them particularly vulnerable to privacy breach attacks [6]. With the impact these breaches varying from simply embarrassing the ...
A modal logic for information system security
(
Australian Computer Society, Inc.
, 2011 , Article)
As a security mechanism, authorization or access control ensures that all accesses to the system resources occur exclusively according to the access polices and rules specified by the systemsecurity agent. Authorization ...
Tracking and constraining authorization provenance
(
Springer Berlin Heidelberg
, 2012 , Conference Paper)
Authorization provenance concerns how an authorization is derived. It appears important to define authorization provenance to (1) analyze policy bases, (2) defend against a class of attacks, and (3) audit authorizations. ...
A Process Model for Customisation of Software in Multi-tenant SaaS Model
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
This paper outlines a generic process framework for customisation of software in cloud computing. The flexibility for client-specific customisation of the software offered by software-as-a-service (SaaS) is limited. The ...
Model for transforming engineering education using technology-enhanced learning
(
Springer International Publishing
, 2015 , Book chapter)
Engineering education is important for all countries to progress and to be competitive in the twenty-first century. This is especially true for countries in the Middle East and North Africa (MENA), which are developing ...
Guidelines for design and implementation of mobile learning
(
IGI Global
, 2016 , Book chapter)
As technology evolves, there is a shift towards the use of mobile technology to deliver education both on-campus in a blended format and online delivery. This shift is moving at a very fast pace which is a major challenge ...
E-learning and mobile learning development in the state of Qatar
(
Taylor and Francis
, 2015 , Book chapter)
The State of Qatar's National Vision 2030 (QNV 2030) defines long-term outcomes for this oil-rich and gas-rich state. It aims at transforming Qatar into an advanced nation, capable of sustaining its own development and ...
Color-based Fuzzy Classifier for automated detection of cancerous cells in histopathological analysis
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
In usual clinical practice, grading of cancer tissues is often done by an expert histopathologist based on their analysis of micro-level architectural features of the cancerous tissue specimen as well as level of presence ...
Time-frequency based signal restoration for laser-ultrasound signals with applications in nondestructive testing
(
IEEE
, 2011 , Conference Paper)
In this paper, an inspection system has been presented that uses Laser-Ultrasound (LU) technique for Nondestructive testing (NDT) of metallic structures with specific interest in Oil & Gas sector. While the developed ...
Cranial reconstruction after decompressive craniectomy: Prediction of complications using fuzzy logic
(
IEEE
, 2011 , Article)
Introduction: Cranial reconstruction after decompressive craniectomy (DC) has been shown to be associated with a relatively high complication rate (16.4%-34%) compared with standard neurosurgical procedures (2%-5%). Most ...