Sciweavers

1324 search results - page 143 / 265
» Automation Controller for Operational IT Management
Sort
View
SACMAT
2006
ACM
14 years 2 months ago
Constraint generation for separation of duty
Separation of Duty (SoD) is widely recognized to be a fundamental principle in computer security. A Static SoD (SSoD) policy states that in order to have all permissions necessary...
Hong Chen, Ninghui Li
ATAL
2010
Springer
13 years 10 months ago
A systematic agent framework for situated autonomous systems
We present a formal framework of an autonomous agent as a collection of coordinated control loops, with a recurring sense, plan, act cycle. Our framework manages the information f...
Frederic Py, Kanna Rajan, Conor McGann
SRDS
2003
IEEE
14 years 2 months ago
Pesto Flavoured Security
We demonstrate that symmetric-key cryptography can be used for both read and write access control. One-time write access can be granted by handing over an encryption key, and our ...
Feike W. Dillema, Tage Stabell-Kulø
HICSS
2003
IEEE
110views Biometrics» more  HICSS 2003»
14 years 2 months ago
Telecommunication Infrastructure Investments and Firm Performance
This research adopts Barua’s [1] three-tier Business Value Complementarity (BVC) model to study the performance of telephone companies (Telcos). Our study integrates constructs ...
Hy Sonya Hsu, Siva K. Balasubramanian
ALP
1992
Springer
14 years 1 months ago
Definitional Trees
Rewriting is a computational paradigm that specifies the actions, but not the control. We introduce a hierarchical structure repreat a high level of abstraction, a form of control....
Sergio Antoy