Sciweavers

303 search results - page 7 / 61
» Context-Sensitive Call Control Using Constraints and Rules
Sort
View
RSEISP
2007
Springer
14 years 1 months ago
Interpreting Low and High Order Rules: A Granular Computing Approach
The main objective of this paper is to provide a granular computing based interpretation of rules representing two levels of knowledge. This is done by adopting and adapting the de...
Yiyu Yao, Bing Zhou, Yaohua Chen
CAISE
2006
Springer
13 years 11 months ago
Controlling the Level of Business Process Instance Flexibility via Rules of Planning
When an organization decides on the level of flexibility in handling business process instances, it needs to impose this level in operational practice. The way of imposing a given ...
Ilia Bider, Alexey Striy
IEEEARES
2007
IEEE
14 years 2 months ago
CSP-Based Firewall Rule Set Diagnosis using Security Policies
The most important part of a firewall configuration process is the implementation of a security policy by a security administrator. However, this security policy is not designed b...
Sergio Pozo, Rafael Ceballos, Rafael M. Gasca
CORR
2010
Springer
67views Education» more  CORR 2010»
13 years 7 months ago
Using ATL to define advanced and flexible constraint model transformations
Abstract. Transforming constraint models is an important task in recent constraint programming systems. User-understandable models are defined during the modeling phase but rewriti...
Raphaël Chenouard, Laurent Granvilliers, Rica...
TKDE
2008
177views more  TKDE 2008»
13 years 7 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...