Sciweavers

2704 search results - page 28 / 541
» Constraint Management in Engineering of Complex Information ...
Sort
View
TKDE
2008
177views more  TKDE 2008»
13 years 7 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
ACSW
2004
13 years 8 months ago
A Case Study in Access Control Requirements for a Health Information System
We present a detailed examination of the access constraints for a small real-world Health Information System with the aim of achieving minimal access rights for each of the involv...
Mark Evered, Serge Bögeholz
AOSE
2007
Springer
14 years 1 months ago
Tool-Supported Development with Tropos: The Conference Management System Case Study
Abstract. The agent-oriented software engineering methodology Tropos offers a structured development process and supporting tools for developing complex, distributed systems. The ...
Mirko Morandini, Duy Cu Nguyen, Anna Perini, Alber...
ICESS
2004
Springer
14 years 23 days ago
The Modeling for Dynamic Power Management of Embedded Systems
In this paper we present a new modeling technique using software engineering tool Flow Model for modeling and solving the Dynamic Power Management (DPM) with complex behavioral cha...
Jiangwei Huang, Tianzhou Chen, Minjiao Ye, Yi Lian
COOPIS
1994
IEEE
13 years 11 months ago
Ontologies for Enterprise Integration
We present a logical framework for representing the agents in two different cooperating information systems. We define an architecture for Integrated Supply Chain Management in wh...
Mark S. Fox, Michael Grüninger