Sciweavers

1739 search results - page 114 / 348
» Service Morphing: Integrated System- and Application-Level S...
Sort
View
145
Voted
DBSEC
2009
124views Database» more  DBSEC 2009»
15 years 4 months ago
Towards System Integrity Protection with Graph-Based Policy Analysis
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn
137
Voted
KDD
2004
ACM
213views Data Mining» more  KDD 2004»
15 years 8 months ago
Analytical view of business data
This paper describes a logical extension to Microsoft Business Framework (MBF) called Analytical View (AV). AV consists of three components: Model Service for design time, Busines...
Adam Yeh, Jonathan Tang, Youxuan Jin, Sam Skrivan
ATAL
2008
Springer
15 years 5 months ago
Using SOA Provenance to Implement Norm Enforcement in e-Institutions
In the last 10 years several approaches and technologies other than MAS (such as Web services and Grid computing) have emerged, with the support of the industry, providing their o...
Javier Vázquez-Salceda, Sergio Álvar...
SECPERU
2006
IEEE
15 years 9 months ago
Service-Oriented Security Architecture for CII based on Sensor Networks
The extraordinary growth of the Information Society is originating a high dependency on ICT. This provokes that those strongly interrelated technological infrastructures, as well ...
Javier Lopez, José A. Montenegro, Rodrigo R...
MKWI
2008
168views Business» more  MKWI 2008»
15 years 4 months ago
Towards Automated Risk Identification in Service-Oriented Architectures
: IT risk management is an important challenge for businesses and software vulnerabilities are a major source of IT risks, as the 2006 CSI/FBI Computer Crime and Security Survey [G...
Lutz Lowis