Sciweavers

1353 search results - page 48 / 271
» Securing Current and Future Process Control Systems
Sort
View
BPM
2008
Springer
115views Business» more  BPM 2008»
15 years 4 months ago
Workflows in Dynamic Development Processes
Process management systems are used in many domains to monitor and control processes. Development processes require specific support, which is not provided by conventional workflow...
Thomas Heer, Christoph Briem, René Wör...
118
Voted
SIGCOMM
2009
ACM
15 years 9 months ago
Resonance: dynamic access control for enterprise networks
Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and sys...
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, Ru...
120
Voted
CCS
2007
ACM
15 years 8 months ago
Specifying and analyzing security automata using CSP-OZ
Security automata are a variant of B¨uchi automata used to specify security policies that can be enforced by monitoring system execution. In this paper, we propose using CSP-OZ, ...
David A. Basin, Ernst-Rüdiger Olderog, Paul E...
118
Voted
CCS
2006
ACM
15 years 6 months ago
Safety analysis of usage control authorization models
The usage control (UCON) model was introduced as a unified approach to capture a number of extensions for traditional access control models. While the policy specification flexibi...
Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Pre...
112
Voted
ASIAN
2007
Springer
129views Algorithms» more  ASIAN 2007»
15 years 6 months ago
An Integrated Model for Access Control and Information Flow Requirements
Current information systems are more and more complex. They require more interactions between different components and users. So, ensuring system security must not be limited to us...
Samiha Ayed, Nora Cuppens-Boulahia, Fréd&ea...