Sciweavers

106 search results - page 9 / 22
» Model-Driven Enterprise Systems Configuration
Sort
View
ICC
2009
IEEE
164views Communications» more  ICC 2009»
13 years 5 months ago
Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of...
Khalid Alsubhi, Issam Aib, Jérôme Fra...
TGC
2005
Springer
14 years 1 months ago
Engineering Runtime Requirements-Monitoring Systems Using MDA Technologies
The Model-Driven Architecture (MDA) technology toolset includes a language for describing the structure of meta-data, the MOF, and a language for describing consistency properties ...
James Skene, Wolfgang Emmerich
FASE
2010
Springer
13 years 5 months ago
A Verifiable Modeling Approach to Configurable Role-Based Access Control
Role-based access control (RBAC) is a popular access control model for enterprise systems due to its economic benefit and scalability. There are many RBAC features available, each ...
Dae-Kyoo Kim, Lunjin Lu, Sangsig Kim
EDOC
2007
IEEE
14 years 2 months ago
Business and IT Alignment with SEAM for Enterprise Architecture
To align an IT system with an organization’s needs, it is necessary to understand the organization’s position within its environment as well as its internal configuration. In ...
Alain Wegmann, Gil Regev, Irina Rychkova, Lam-Son ...
JOT
2007
110views more  JOT 2007»
13 years 7 months ago
Enterprise Integration in Metadata Environment
Metadata play crucial role in enterprise interoperability between business, service rmation layers. Metadata in different form, such as the abstract of system structure, aggregati...
Raymond Wu