Sciweavers

182 search results - page 20 / 37
» A Decentralized Model for Information Flow Control
Sort
View
ICARCV
2006
IEEE
128views Robotics» more  ICARCV 2006»
14 years 1 months ago
Modeling Supply Chain Configuration Based on Colored Petri Nets
—This paper introduces an integrated modeling and analysis formalism based on colored Petri nets (CPNs) for supply chain configuration and evaluation. The structural changes of d...
Lianfeng Zhang, Xiao You, Jianxin Jiao, Petri Helo
ICFP
2010
ACM
13 years 8 months ago
Security-typed programming within dependently typed programming
Several recent security-typed programming languages, such as Aura, PCML5, and Fine, allow programmers to express and enforce access control and information flow policies. Most of ...
Jamie Morgenstern, Daniel R. Licata
SASO
2007
IEEE
14 years 1 months ago
Clustering Distributed Energy Resources for Large-Scale Demand Management
Managing demand for electrical energy allows generation facilities to be run more efficiently. Current systems allow for management between large industrial consumers. There is, ...
Elth Ogston, Astrid Zeman, Mikhail Prokopenko, Geo...
EDOC
2005
IEEE
14 years 1 months ago
Bridging the Gap between Data Warehouses and Business Processes: A Business Intelligence Perspective for Event-Driven Process Ch
Data Warehouse (DWH) information is accessed by business processes, and sometimes may also initiate changes of the control flow of business process instances. Today, there are no ...
Veronika Stefanov, Beate List
ICCS
2001
Springer
13 years 12 months ago
The Policy Machine for Security Policy Management
Abstract. Many different access control policies and models have been developed to suit a variety of goals; these include Role-Based Access Control, One-directional Information Flo...
Vincent C. Hu, Deborah A. Frincke, David F. Ferrai...