Sciweavers

3914 search results - page 703 / 783
» Automating SLA modeling
Sort
View
126
Voted
DBSEC
2009
122views Database» more  DBSEC 2009»
15 years 3 months ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald
HPDC
2010
IEEE
15 years 3 months ago
Towards long term data quality in a large scale biometrics experiment
Quality of data plays a very important role in any scientific research. In this paper we present some of the challenges that we face in managing and maintaining data quality for a...
Hoang Bui, Diane Wright, Clarence Helm, Rachel Wit...
124
Voted
HPDC
2010
IEEE
15 years 3 months ago
Efficient querying of distributed provenance stores
Current projects that automate the collection of provenance information use a centralized architecture for managing the resulting metadata - that is, provenance is gathered at rem...
Ashish Gehani, Minyoung Kim, Tanu Malik
118
Voted
CAISE
2010
Springer
15 years 2 months ago
Dynamic Authorisation Policies for Event-Based Task Delegation
Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are tw...
Khaled Gaaloul, Ehtesham Zahoor, François C...
CORR
2010
Springer
160views Education» more  CORR 2010»
15 years 2 months ago
PCA 4 DCA: The Application Of Principal Component Analysis To The Dendritic Cell Algorithm
As one of the newest members in the field of artificial immune systems (AIS), the Dendritic Cell Algorithm (DCA) is based on behavioural models of natural dendritic cells (DCs). U...
Feng Gu, Julie Greensmith, Robert Oates, Uwe Aicke...