Sciweavers

1353 search results - page 39 / 271
» Securing Current and Future Process Control Systems
Sort
View
USENIX
2007
15 years 4 months ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...
135
Voted
COLING
2010
14 years 9 months ago
Controlling Listening-oriented Dialogue using Partially Observable Markov Decision Processes
This paper investigates how to automatically create a dialogue control component of a listening agent to reduce the current high cost of manually creating such components. We coll...
Toyomi Meguro, Ryuichiro Higashinaka, Yasuhiro Min...
111
Voted
CAISE
2009
Springer
15 years 9 months ago
Analysis and Validation of Control-Flow Complexity Measures with BPMN Process Models
Evaluating the complexity of business processes during the early stages of their development, primarily during the process modelling phase, provides organizations and stakeholder w...
Elvira Rolón Aguilar, Jorge Cardoso, F&eacu...
148
Voted
JDCTA
2010
125views more  JDCTA 2010»
14 years 9 months ago
Safety technologies impacts survey in M-services security provision
Nowadays, Effectiveness and benefits of mobile phone technologies appeared more than expected. During the recent decade, using of mobile phone improved from telephone call tools t...
Fatemeh NasserEslami, Fatemeh Saghafi
123
Voted
ICDCS
2008
IEEE
15 years 9 months ago
Controlled Information Sharing in Collaborative Distributed Query Processing
We present a simple, yet powerful, approach for the specification and enforcement of authorizations regulating data release among data holders collaborating in a distributed comp...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...