Sciweavers

106 search results - page 19 / 22
» Model-Driven Enterprise Systems Configuration
Sort
View
CIDR
2009
126views Algorithms» more  CIDR 2009»
13 years 8 months ago
Declarative Reconfigurable Trust Management
In recent years, there has been a proliferation of declarative logic-based trust management languages and systems proposed to ease the description, configuration, and enforcement ...
William R. Marczak, David Zook, Wenchao Zhou, Molh...
POLICY
2001
Springer
14 years 5 days ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
IESA
2007
13 years 9 months ago
A Security Framework for Smart Ubiquitous Industrial Resources
Conventional approaches to manage and control security seem to have reached their limits in new complex environments. These environments are open, dynamic, heterogeneous, distribut...
Anton Naumenko, Artem Katasonov, Vagan Y. Terziyan
HICSS
2009
IEEE
123views Biometrics» more  HICSS 2009»
14 years 2 months ago
Towards Conceptual Metamodeling of IT Governance Frameworks Approach - Use - Benefits
Up to now, there has been little academic support for the challenges of IT governance/IT management. As a reaction, various best practice frameworks - like COBIT or CMMI - were de...
Matthias Goeken, Stefanie Alter
DSN
2005
IEEE
14 years 1 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...