Sciweavers

1353 search results - page 34 / 271
» Securing Current and Future Process Control Systems
Sort
View
ISI
2006
Springer
15 years 2 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
95
Voted
SAC
2008
ACM
15 years 2 months ago
Anomaly detection algorithms in logs of process aware systems
Today, there is a variety of systems that support business process as a whole or partially. However, normative systems are not appropriate for some domains (e.g. health care) as a...
Fábio de Lima Bezerra, Jacques Wainer
MMB
1997
Springer
126views Communications» more  MMB 1997»
15 years 6 months ago
Goal-oriented Performance Control for Transaction Processing
The performance of current transaction processing systems largely depends on human experts for administration and tuning. These experts have to specify a multitude of internal con...
Erhard Rahm
109
Voted
AINA
2008
IEEE
15 years 9 months ago
WS-BPEL Process Compiler for Resource-Constrained Embedded Systems
Process management and workflow systems play an important role in the composition of services in business as well as automation environments. Processes are designed using tools a...
Hendrik Bohn, Andreas Bobek, Frank Golatowski
128
Voted
ICPP
2005
IEEE
15 years 8 months ago
Session-Based Adaptive Overload Control for Secure Dynamic Web Applications
As dynamic web content and security capabilities are becoming popular in current web sites, the performance demand on application servers that host the sites is increasing, leadin...
Jordi Guitart, David Carrera, Vicenç Beltra...