Sciweavers

2018 search results - page 320 / 404
» On Conceptualization as a Systematic Process
Sort
View
POLICY
2001
Springer
15 years 8 months ago
IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution
IPSec (Internet Security Protocol Suite) functions will be executed correctly only if its policies are correctly specified and configured. Manual IPSec policy configuration is inef...
Zhi Fu, Shyhtsun Felix Wu, He Huang, Kung Loh, Fen...
ACSAC
2000
IEEE
15 years 8 months ago
Layering Boundary Protections: An Experiment in Information Assurance
The DARPA Information Assurance Program has the aim of developing and executing experiments that test specific hypotheses about defense in depth and dynamic defense capabilities. ...
D. Johnson, L. Benzinger
112
Voted
COOPIS
2000
IEEE
15 years 8 months ago
Benchmarking and Configuration of Workflow Management Systems
Workflow management systems (WFMS) are a cornerstone of mission-criticial, possibly cross-organizational business processes. For largescale applications both their performance and ...
Michael Gillmann, Ralf Mindermann, Gerhard Weikum
123
Voted
HICSS
2000
IEEE
169views Biometrics» more  HICSS 2000»
15 years 8 months ago
A Software System for Spatial Data Analysis and Modeling
Advances in geographical information systems (GIS) and supporting data collection technology has resulted in the rapid collection of a huge amount of spatial data. However, known ...
Aleksandar Lazarevic, Tim Fiez, Zoran Obradovic
131
Voted
ICECCS
2000
IEEE
133views Hardware» more  ICECCS 2000»
15 years 8 months ago
An Analysis Tool for Coupling-Based Integration Testing
This research is part of a project to develop practical, effective, formalizable, automatable techniques for integration testing. Integration testing is an important part of the t...
A. Jefferson Offutt, Aynur Abdurazik, Roger T. Ale...