Sciweavers

468 search results - page 37 / 94
» The System Administration Maturity Model - SAMM
Sort
View
CAISE
2006
Springer
13 years 12 months ago
Describing Interoperability: the OoI Ontology
Abstract. Though ontologies are widely used to solve some specific interoperability problems, there is no specific ontology defining what interoperability actually is, independentl...
Yannick Naudet, Thibaud Latour, Kevin Hausmann, Sv...
ISCI
2007
152views more  ISCI 2007»
13 years 8 months ago
Evaluating digital video recorder systems using analytic hierarchy and analytic network processes
Digital video recorder (DVR) systems are novel security products with significant potential for application in the surveillance market, which, like many other areas of security t...
Che-Wei Chang, Cheng-Ru Wu, Chin-Tsai Lin, Hung-Lu...
SACMAT
2010
ACM
14 years 28 days ago
An access control model for mobile physical objects
Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects’ trajectories. Existing access control models ca...
Florian Kerschbaum
DBSEC
2003
155views Database» more  DBSEC 2003»
13 years 9 months ago
Schema Based XML Security: RBAC Approach
As a platform-independent solution, XML is going to be used in many environments such as application integration and Web Services. Security of XML instance is a basic problem, esp...
Xinwen Zhang, Jaehong Park, Ravi S. Sandhu
DBSEC
2004
97views Database» more  DBSEC 2004»
13 years 9 months ago
Configuring Storage Area Networks for Mandatory Security
Storage-area networks are a popular and efficient way of building large storage systems both in an enterprise environment and for multi-domain storage service providers. In both en...
Benjamin Aziz, Simon N. Foley, John Herbert, Garre...