بحث بسيط
السجلات المعروضة 6331 -- 6340 من 6657
Profile-based security assurances for service software
(
Springer Verlag
, 2011 , Conference Paper)
In service software, it is highly desirable to have a service composition mechanism that supports automatic reasoning about the security assurances of services. Service consumers such as human, machine, even application ...
Cloud computing without seeing
(
Association for Computing Machinery
, 2011 , Conference Paper)
In the emerging cloud computing model, security is of paramount concern. This paper discusses the need for practical techniques that enable private outsourcing on the cloud by allowing the service provider to work on ...
Automatic verification of health regulatory compliance in cloud computing
(
IEEE
, 2013 , Conference Paper)
This paper aims to develop an approach that enables cloud computing clients to verify health regulatory compliance claimed by cloud computing providers. In this approach, clients of cloud computing could check automatically ...
Social access control language (SocACL)
(
Association for Computing Machinery
, 2013 , Conference Paper)
Online Social Networks hold vast amounts of readily accessible personal information leaving them particularly vulnerable to privacy breach attacks [6]. With the impact these breaches varying from simply embarrassing the ...
A modal logic for information system security
(
Australian Computer Society, Inc.
, 2011 , Article)
As a security mechanism, authorization or access control ensures that all accesses to the system resources occur exclusively according to the access polices and rules specified by the systemsecurity agent. Authorization ...
Tracking and constraining authorization provenance
(
Springer Berlin Heidelberg
, 2012 , Conference Paper)
Authorization provenance concerns how an authorization is derived. It appears important to define authorization provenance to (1) analyze policy bases, (2) defend against a class of attacks, and (3) audit authorizations. ...
A Process Model for Customisation of Software in Multi-tenant SaaS Model
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
This paper outlines a generic process framework for customisation of software in cloud computing. The flexibility for client-specific customisation of the software offered by software-as-a-service (SaaS) is limited. The ...
Model for transforming engineering education using technology-enhanced learning
(
Springer International Publishing
, 2015 , Book chapter)
Engineering education is important for all countries to progress and to be competitive in the twenty-first century. This is especially true for countries in the Middle East and North Africa (MENA), which are developing ...
Entrepreneurship, ICT and innovation: State of qatar transformation to a knowledge-based economy
(
Nova Science Publishers, Inc.
, 2019 , Book chapter)
Oil and natural gas revenues still form the main part of national income and government revenues in Qatar. However, since, 1995, Qatar's economy is undergoing a critical transformation, shifting from a high dependence on ...
Guidelines for design and implementation of mobile learning
(
IGI Global
, 2016 , Book chapter)
As technology evolves, there is a shift towards the use of mobile technology to deliver education both on-campus in a blended format and online delivery. This shift is moving at a very fast pace which is a major challenge ...