Sciweavers

1324 search results - page 133 / 265
» Automation Controller for Operational IT Management
Sort
View
HICSS
2009
IEEE
177views Biometrics» more  HICSS 2009»
14 years 3 months ago
Intelligent Alarm Processing: From Data Intensive to Information Rich
The requirement for power system operators to respond more efficiently to the stressed power system conditions that may create large number of alarms asks fort advanced alarm proc...
Mladen Kezunovic, Yufan Guan
SACMAT
2003
ACM
14 years 2 months ago
PBDM: a flexible delegation model in RBAC
Role-based access control (RBAC) is recognized as an efficient access control model for large organizations. Most organizations have some business rules related to access control...
Xinwen Zhang, Sejong Oh, Ravi S. Sandhu
POS
1994
Springer
14 years 1 months ago
Concurrent Shadow Paging in the Flask Architecture
The differing requirements for concurrency models in programming languages and databases are widely diverse and often seemingly incompatible. The rigid provision of a particular c...
David S. Munro, Richard C. H. Connor, Ronald Morri...
SACMAT
2003
ACM
14 years 2 months ago
Induced role hierarchies with attribute-based RBAC
The Role-Based Access Control (RBAC) model is traditionally used to manually assign users to appropriate roles. When the service-providing enterprise has a massive customer base, ...
Mohammad A. Al-Kahtani, Ravi S. Sandhu
WSC
1998
13 years 10 months ago
Initializing On-line Simulations from the State of a Distributed System
In this paper, we address the complex task of initializing an on-line simulation to a current system state collected from an operating physical system. The paper begins by discuss...
Fernando G. Gonzalez, Wayne J. Davis