Sciweavers

468 search results - page 33 / 94
» The System Administration Maturity Model - SAMM
Sort
View
SIGSAND
2008
13 years 9 months ago
Relational Model Driven Application Design
Abstract: A closer look at typical information systems shows that relatively simple routines often contribute significantly to the overall expenses of the software development proc...
Michael Guckert, René Gerlach
FMCO
2003
Springer
154views Formal Methods» more  FMCO 2003»
14 years 1 months ago
Tools for Generating and Analyzing Attack Graphs
Abstract. Attack graphs depict ways in which an adversary exploits system vulnerabilities to achieve a desired state. System administrators use attack graphs to determine how vulne...
Oleg Sheyner, Jeannette M. Wing
CSREAESA
2008
13 years 9 months ago
Achieving Industrial Strength Timing Predictions of Embedded System Behavior
This paper discusses why the extensive scientific results on predicting embedded systems temporal behavior never, or very seldom, reaches the industrial community. We also point ou...
Mikael Nolin, Jukka Mäki-Turja, Kaj Hänn...
CCS
2004
ACM
14 years 1 months ago
Comparing the expressive power of access control models
Comparing the expressive power of access control models is recognized as a fundamental problem in computer security. Such comparisons are generally based on simulations between di...
Mahesh V. Tripunitara, Ninghui Li
DOLAP
2010
ACM
13 years 6 months ago
Relational versus non-relational database systems for data warehousing
Relational database systems have been the dominating technology to manage and analyze large data warehouses. Moreover, the ER model, the standard in database design, has a close r...
Carlos Ordonez, Il-Yeol Song, Carlos Garcia-Alvara...