Items where Division is "Faculty of Computing, Engineering and the Built Environment > School of Computing and Digital Technology" and Year is 2008

Up a level
Export as [feed] RSS
Group by: Creators | Item Type | No Grouping
Jump to: A | B | E | F | H | P | S | W
Number of items: 11.

A

Abdallah, Ali E. and Takabi, Hassan (2008) Integrating Delegation with the Formal Core RBAC Model. In: Information Assurance and Security, 2008. ISIAS '08. Fourth International Conference. IEEE Conference Publications, pp. 33-36. ISBN 978-0-7695-3324-7

B

Bowring, N. and Williams, Ian and Johnson, C. and Jaiswal, J. (2008) Fatigue Crack, Squat and Wheel Burn detection by a Multi-Scale Statistical Image Processing Technique. In: Annual General Meeting of the British Institute of Non-Destructive Testing.

E

Eardley, W. A. and Shah, H. and Radman, A. (2008) A Model for Improving the Role of IT. BPR, Business Process Management Journal, 14 (5).

F

Foss, J. (2008) LiVE – Learning in Virtual Environments. In: Third European Conference on the Use of Modern Information and Communication Technologies – ECUMICT, March 2008, Gent, Belgium.

H

Haidar, Ali N. and Abdallah, Ali E. (2008) Comparison and Evaluation of Identity Management in Three Architectures for Virtual Organizations. In: Information Assurance and Security, 2008. ISIAS '08. Fourth International Conference. IEEE Conference Publications, pp. 21-26. ISBN 978-0-7695-3324-7

Haidar, Ali Nasrat and Abdallah, Ali E. (2008) Composition and Customization of Web Services Using Wrappers: A Formal Approach Based on CSP. In: Software Engineering Workshop, 2008. SEW '08. 32nd Annual IEEE. IEEE Conference Publications, pp. 187-194. ISBN 978-0-7695-3617-0

Haidar, Ali Nasrat and Abdallah, Ali E. (2008) Composition of Web Services Using Wrappers. In: Leveraging Applications of Formal Methods, Verification and Validation. Springer, pp. 862-865. ISBN 0302-9743

Haidar, Ali Nasrat and Abdallah, Ali E. (2008) Weaving Authentication and Authorization Requirements into the Functional Model of a System Using Z Promotion. In: Leveraging Applications of Formal Methods, Verification and Validation. Springer, pp. 831-846. ISBN 0302-9743

P

Palomar, Esther and Tapiador, Juan M.E. and Hernandez-Castro, Julio C. and Ribagorda, Arturo (2008) Secure content access and replication in pure P2P networks. Computer Communications, 31 (2). pp. 266-279. ISSN 0140-3664

S

Shah, H. (2008) Higher Level Qualifications Through Work-Based Learning. In: Invited workshop, UVAC 2008, York.

W

Williams, Ian and Svoboda, D. and Bowring, N. and Guest, E. (2008) Statistical Edge Detection of Concealed Weapons Using Artificial Neural Networks. In: SPIE-IS&T Electronic Imaging, Bellingham, Washington.

This list was generated on Thu Mar 28 20:50:00 2024 UTC.

Research

In this section...