Sciweavers

468 search results - page 35 / 94
» The System Administration Maturity Model - SAMM
Sort
View
ENTCS
2008
72views more  ENTCS 2008»
13 years 8 months ago
Towards a Notion of Transaction in Graph Rewriting
We define transactional graph transformation systems (t-gtss), a mild extension of the ordinary framework for the double-pushout approach to graph transformation, which allows to ...
Paolo Baldan, Andrea Corradini, Fernando Luí...
DLS
2010
277views Languages» more  DLS 2010»
13 years 6 months ago
Factor: a dynamic stack-based programming language
Factor is a new dynamic object-oriented programming language. It began as an embedded scripting language and evolved to a mature application development language. The language has...
Sviatoslav Pestov, Daniel Ehrenberg, Joe Groff
SACMAT
2010
ACM
13 years 6 months ago
Enforcing spatial constraints for mobile RBAC systems
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
Michael S. Kirkpatrick, Elisa Bertino
HICSS
2003
IEEE
113views Biometrics» more  HICSS 2003»
14 years 1 months ago
Multi-Criteria Task Assignment in Workflow Management Systems
During workflow design, workflow modelers generally specify the performers of a task by their organizational role. However, during workflow enactment, numerous workers with differ...
Minxin Shen, Gwo-Hshiung Tzeng, Duen-Ren Liu
CCS
2007
ACM
14 years 2 months ago
Optimal security hardening using multi-objective optimization on attack tree models of networks
Researchers have previously looked into the problem of determining if a given set of security hardening measures can effectively make a networked system secure. Many of them also...
Rinku Dewri, Nayot Poolsappasit, Indrajit Ray, Dar...