Sciweavers

1167 search results - page 24 / 234
» policy 2007
Sort
View
KES
2007
Springer
13 years 10 months ago
Evaluation of a Hierarchical Shaper as a Policy Execution Point
Takeshi Aimoto, Takeki Yazaki, Takashi Isobe, Yosh...
POLICY
2007
Springer
14 years 4 months ago
Policy-Driven Negotiation for Authorization in the Grid
In many Grid services deployments, the clients and servers reside in different administrative domains. Hence, there is a requirement both to discover each other’s authorization ...
Ionut Constandache, Daniel Olmedilla, Frank Sieben...
DMIN
2006
123views Data Mining» more  DMIN 2006»
14 years 1 days ago
Novel Evaluation Framework of Intrusion Detection Systems with Respect to Security Policies
Intrusion Detection System is an integral component of the computer security infrastructure. It is usually put in place to detect computer security policy violations. While its ro...
Negmat Mullodzhanov
ISSRE
2007
IEEE
14 years 5 days ago
Testing Security Policies: Going Beyond Functional Testing
While important efforts are dedicated to system functional testing, very few works study how to test specifically security mechanisms, implementing a security policy. This paper i...
Yves Le Traon, Tejeddine Mouelhi, Benoit Baudry
WSC
2007
14 years 29 days ago
A hybrid inventory control system approach applied to the food industry
The appropriate production and inventory control policy is a key factor for modern enterprises’ success in competitive environment. In the food industry, most of food manufactur...
David Claudio, Jie Zhang, Ying Zhang