Sciweavers

94 search results - page 5 / 19
» A Regulated Approach to Certificate Management
Sort
View
ESORICS
2006
Springer
14 years 6 days ago
Reducing the Dependence of SPKI/SDSI on PKI
Abstract. Trust-management systems address the authorization problem in distributed systems. They offer several advantages over other approaches, such as support for delegation and...
Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwo...
SMC
2010
IEEE
151views Control Systems» more  SMC 2010»
13 years 7 months ago
A situated approach to enterprise architecture management
Abstract—Today’s enterprises are confronted with a challenging environment that demands continuous transformations. Globalized markets, disruptive technological innovations, an...
Sabine Buckl, Christian M. Schweda, Florian Matthe...
IEEEARES
2007
IEEE
14 years 2 months ago
Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management
The catchword “compliance” dominates the actual debate about Identity Management and information security like few before. Companies need to comply with a variety of internal ...
Ludwig Fuchs, Günther Pernul
ISPW
2007
IEEE
14 years 2 months ago
An Algebraic Approach for Managing Inconsistencies in Software Processes,
To produce quality software and evolve them in an economic and timely fashion, enactable software process models are used for regulating development activities with the support of ...
Qiusong Yang, Mingshu Li, Qing Wang, Guowei Yang, ...
EDBT
2004
ACM
94views Database» more  EDBT 2004»
14 years 8 months ago
Mining Extremely Skewed Trading Anomalies
Trading surveillance systems screen and detect anomalous trades of equity, bonds, mortgage certificates among others. This is to satisfy federal trading regulations as well as to p...
Wei Fan, Philip S. Yu, Haixun Wang