Sciweavers

8697 search results - page 61 / 1740
» An Approach to the Enterprise Integration
Sort
View
ICRA
2000
IEEE
93views Robotics» more  ICRA 2000»
14 years 2 months ago
Scheduling and Coordination in Manufacturing Enterprise Automation
Manufacturing enterprise automation was focused on factory level where scheduling is a key issue in the past. As more and more companies are relying on their business parmers or s...
Haoxun Chen, Peter B. Luh
CCS
2008
ACM
14 years 2 days ago
Flexible and secure enterprise rights management based on trusted virtual domains
The requirements for secure document workflows in enterprises become increasingly sophisticated, with employees performing different tasks under different roles using the same pro...
Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, ...
HICSS
2002
IEEE
142views Biometrics» more  HICSS 2002»
14 years 3 months ago
Multi-perspective Enterprise Modeling (MEMO) - Conceptual Framework and Modeling Languages
For many companies, the strategic as well as the organizational fit of their information systems is a pivotal factor for staying competitive. At the same time, there is an increas...
Ulrich Frank
DBSEC
2009
122views Database» more  DBSEC 2009»
13 years 11 months ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald
CCS
2009
ACM
14 years 4 months ago
A probabilistic approach to hybrid role mining
Role mining algorithms address an important access control problem: configuring a role-based access control system. Given a direct assignment of users to permissions, role mining...
Mario Frank, Andreas P. Streich, David A. Basin, J...