Sciweavers

1324 search results - page 145 / 265
» Automation Controller for Operational IT Management
Sort
View
POLICY
2001
Springer
14 years 1 months ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
SASO
2007
IEEE
14 years 3 months ago
Root Cause Isolation for Self Healing in J2EE Environments
— The increasing complexity of distributed enterprise systems has made the task of managing these systems difficult and time consuming. The only way to simplify the management p...
Umesh Bellur, Amar Agrawal
DBSEC
2009
122views Database» more  DBSEC 2009»
13 years 10 months ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald
COBUILD
1999
Springer
14 years 1 months ago
OWL: An Object-Oriented Framework for Intelligent Home and Office Applications
The goal of OWL (Object-Oriented Workplace Laboratory) is to provide an object-oriented and component-based framework that supports the engineering of applications for the design, ...
Bernd Brügge, Ralf Pfleghar, Thomas Reicher
CDC
2010
IEEE
116views Control Systems» more  CDC 2010»
13 years 4 months ago
Dynamic reconfiguration of terminal airspace during convective weather
Dynamic airspace configuration (DAC) algorithms strive to restructure the U.S. National Airspace System (NAS) in ways that allow air traffic control to better manage aircraft flows...
Diana Michalek, Hamsa Balakrishnan