Now showing items 11-20 of 89
Deriving enforcement mechanisms for policies
A Framework for Minimising Data Leakage from Non-Production Systems
(Chapman and Hall, 2017-03-03)
There is much research and advice around de-identification techniques and data governance. This brings together the practical aspects to propose a simplified business model and framework for informed decision making for ...
Personalized Students' Profile Based on Ontology and Rule-based Reasoning
(ICST Transactions, 2016)
Nowadays, most of the existing e-learning architecture provides the same content to all learners due to "one size fits for all" concept. E-learning refers to the utilization of electronic innovations to convey and encourage ...
Dynamic access control policies and web-service composition.
(IEEE Computer Society, 2005)
Service composition is a fundamental technique for develop- ing web-service applications. In general, a single service is not enough to achieve the user’s goal, rather several services, often from different providers, ...
A Novel Algorithm for Course Learning Object Recommendation Based on Student Learning Styles
Explosive growth of e-learning in the recent years has faced difficulty of locating appropriate learning resources to match the students learning styles. Recommender system is a promising technology in e-learning environments ...
ULEARN: Personalised Learner’s Profile Based On Dynamic Learning Style Questionnaire
E-Learning recommender system effectiveness re- lies upon their ability to recommend appropriate learning con- tents according to the learner learning style and preferences. An effective approach to handle the learner ...
A compositional event and time-based policy model
Routing management for DTN networks in VANET
Routing protocols in VANET are considered as one of the critical dilemmas that need to be tackled, especially in sparse environment. Thus designing an efficient routing mechanism has an impact on enhancing the ...
Dynamic Access Control Policies - Specification and Verification
(Oxford University Press, 2012)
Security requirements deal with the protection of assets against unauthorized access (disclosure or modification) and their availability to authorized users. Temporal constraints of history-based access control policies ...
Analysis and run-time verification of dynamic security policies.