Sciweavers

116 search results - page 20 / 24
» Lessons Learned from Implementing WS-Coordination and WS-Ato...
Sort
View
SP
1999
IEEE
145views Security Privacy» more  SP 1999»
13 years 12 months ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo
CAV
1998
Springer
103views Hardware» more  CAV 1998»
13 years 11 months ago
You Assume, We Guarantee: Methodology and Case Studies
Assume-guarantee reasoning has long been advertised as an important method for decomposing proof obligations in system veri cation. Re nement mappings (homomorphisms) have long bee...
Thomas A. Henzinger, Shaz Qadeer, Sriram K. Rajama...
SP
1989
IEEE
101views Security Privacy» more  SP 1989»
13 years 11 months ago
With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988
In early November 1988 the Internet, a collection of networks consisting of 60,000 host computers implementing the TCP/IP protocol suite, was attacked by a virus, a programwhich b...
Mark W. Eichin, Jon A. Rochlis
WIKIS
2010
ACM
13 years 7 months ago
ThinkFree: using a visual Wiki for IT knowledge management in a tertiary institution
We describe ThinkFree, an industrial Visual Wiki application which provides a way for end users to better explore knowledge of IT Enterprise Architecture assets that is held withi...
Christian Hirsch, John G. Hosking, John C. Grundy,...
FIS
2010
13 years 5 months ago
Managing On-Demand Business Applications with Hierarchical Service Level Agreements
Business applications are facing an increasing demand for being delivered as on-demand services. Service Level Agreements (SLAs) are a common way for specifying the exact condition...
Wolfgang Theilmann, Ulrich Winkler, Jens Happe, Il...