Sciweavers

577 search results - page 89 / 116
» An enterprise assurance framework
Sort
View
ECOOP
2009
Springer
14 years 10 months ago
Fine-Grained Access Control with Object-Sensitive Roles
Role-based access control (RBAC) is a common paradigm to ensure that users have sufficient rights to perform various system operations. In many cases though, traditional RBAC does ...
Jeffrey Fischer, Daniel Marino, Rupak Majumdar, To...
ICDE
2008
IEEE
200views Database» more  ICDE 2008»
14 years 4 months ago
Enforcing security in semantics driven policy based networks
— Security is emerging as an important requirement for a number of distributed applications such as online banking, social networking etc. due to the private nature of the data b...
Palanivel Balaji Kodeswaran, Sethuram Balaji Kodes...
ADC
2006
Springer
135views Database» more  ADC 2006»
14 years 3 months ago
Using a temporal constraint network for business process execution
Business process management (BPM) has emerged as a dominant technology in current enterprise systems and business solutions. However, the technology continues to face challenges i...
Ruopeng Lu, Shazia Wasim Sadiq, Vineet Padmanabhan...
CAISE
2005
Springer
14 years 3 months ago
Capitalizing on Awareness of User Tasks for Guiding Self-Adaptation
Abstract. Computers support more and more tasks in the personal and professional activities of users. Such user tasks increasingly span large periods of time and many locations acr...
João Pedro Sousa, Vahe Poladian, David Garl...
HICSS
2003
IEEE
134views Biometrics» more  HICSS 2003»
14 years 3 months ago
Scheduling the Supply Chain by Teams of Agents
When a supply chain is established supply chain management (SCM) needs supporting tools for the tasks of operative planning, scheduling, and coordination. These tasks have to be p...
Jürgen Sauer, Hans-Jürgen Appelrath