Items where Division is "Faculty of Computing, Engineering and the Built Environment" and Year is 2008
Up a level |
A
Abdallah, Ali E. and Takabi, Hassan (2008) Integrating Delegation with the Formal Core RBAC Model. In: Information Assurance and Security, 2008. ISIAS '08. Fourth International Conference. IEEE Conference Publications, pp. 33-36. ISBN 978-0-7695-3324-7
B
Bowring, N. and Williams, Ian and Johnson, C. and Jaiswal, J. (2008) Fatigue Crack, Squat and Wheel Burn detection by a Multi-Scale Statistical Image Processing Technique. In: Annual General Meeting of the British Institute of Non-Destructive Testing.
E
Eardley, W. A. and Shah, H. and Radman, A. (2008) A Model for Improving the Role of IT. BPR, Business Process Management Journal, 14 (5).
F
Foss, J. (2008) LiVE – Learning in Virtual Environments. In: Third European Conference on the Use of Modern Information and Communication Technologies – ECUMICT, March 2008, Gent, Belgium.
H
Haidar, Ali N. and Abdallah, Ali E. (2008) Comparison and Evaluation of Identity Management in Three Architectures for Virtual Organizations. In: Information Assurance and Security, 2008. ISIAS '08. Fourth International Conference. IEEE Conference Publications, pp. 21-26. ISBN 978-0-7695-3324-7
Haidar, Ali Nasrat and Abdallah, Ali E. (2008) Composition and Customization of Web Services Using Wrappers: A Formal Approach Based on CSP. In: Software Engineering Workshop, 2008. SEW '08. 32nd Annual IEEE. IEEE Conference Publications, pp. 187-194. ISBN 978-0-7695-3617-0
Haidar, Ali Nasrat and Abdallah, Ali E. (2008) Composition of Web Services Using Wrappers. In: Leveraging Applications of Formal Methods, Verification and Validation. Springer, pp. 862-865. ISBN 0302-9743
Haidar, Ali Nasrat and Abdallah, Ali E. (2008) Weaving Authentication and Authorization Requirements into the Functional Model of a System Using Z Promotion. In: Leveraging Applications of Formal Methods, Verification and Validation. Springer, pp. 831-846. ISBN 0302-9743
P
Palomar, Esther and Tapiador, Juan M.E. and Hernandez-Castro, Julio C. and Ribagorda, Arturo (2008) Secure content access and replication in pure P2P networks. Computer Communications, 31 (2). pp. 266-279. ISSN 0140-3664
S
Shah, H. (2008) Higher Level Qualifications Through Work-Based Learning. In: Invited workshop, UVAC 2008, York.
W
Williams, Ian and Svoboda, D. and Bowring, N. and Guest, E. (2008) Statistical Edge Detection of Concealed Weapons Using Artificial Neural Networks. In: SPIE-IS&T Electronic Imaging, Bellingham, Washington.