Sciweavers

497 search results - page 46 / 100
» A knowledgeable security model for distributed health inform...
Sort
View
ESORICS
2002
Springer
14 years 8 months ago
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation
Abstract. An important goal of security in information systems is confidentiality. A confidentiality policy specifies which users should be forbidden to acquire what kind of inform...
Joachim Biskup, Piero A. Bonatti
ATAL
2005
Springer
14 years 2 months ago
A multiagent system manages collaboration in emergent processes
Emergent processes are non-routine, collaborative business processes whose execution is guided by the knowledge that emerges during a process instance. In so far as the process go...
John K. Debenham
DEXAW
2005
IEEE
108views Database» more  DEXAW 2005»
14 years 2 months ago
Developing an Ontology for the Domain Name System
Ontologies provide a means of modelling and representing a knowledge domain. Such representation, already used in purpose-built distributed information systems, can also be of gre...
Nickolas J. G. Falkner, Paul D. Coddington, Andrew...
IM
2003
13 years 10 months ago
Generic On-Line Discovery of Quantitative Models for Service Level Management
: Quantitative models are needed for a variety of management tasks, including (a) identification of critical variables to use for health monitoring, (b) anticipating service level...
Yixin Diao, Frank Eskesen, Steve Froehlich, Joseph...
CCS
2007
ACM
14 years 3 months ago
Non-volatile memory and disks: avenues for policy architectures
As computing models change, so too do the demands on storage. Distributed and virtualized systems introduce new vulnerabilities, assumptions, and performance requirements on disks...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...