Sciweavers

33 search results - page 2 / 7
» The BT Intranet: Information by Design
Sort
View
ACSAC
2000
IEEE
13 years 10 months ago
A Policy-based Access Control Mechanism for the Corporate Web
Current Web technologies use access control lists (ACLs) for enforcing regulations and practices governing businesses today. Having the policy hard-coded into ACLs causes manageme...
Victoria Ungureanu, F. Vesuna, Naftaly H. Minsky
WWW
2006
ACM
14 years 6 months ago
GIO: a semantic web application using the information grid framework
It is well understood that the key for successful Semantic Web applications depends on the availability of machine understandable meta-data. We describe the Information Grid, a pr...
Omar Alonso, Sandeepan Banerjee, Mark Drake
ICSE
2003
IEEE-ACM
14 years 5 months ago
An Empirical Study of an Informal Knowledge Repository in a Medium-Sized Software Consulting Company
Numerous studies have been conducted on design and architecture of knowledge repositories. This paper addresses the need for looking at practices where knowledge repositories are ...
Emil Røyrvik, Torgeir Dingsøyr
AAI
2000
182views more  AAI 2000»
13 years 5 months ago
Implementing a Business Process Management System Using ADEPT: A Real-World Case Study
: This paper describes how ADEPT's agent-based design and implementation philosophy was used to prototype a business process management system for a real-world application. Th...
Nicholas R. Jennings, Peyman Faratin, Timothy J. N...
AUSFORENSICS
2003
13 years 6 months ago
Design of a Network-Access Audit Log for Security Monitoring and Forensic Investigation
An attempt at determining the source of anomalous network traffic may result in the identification of the networked system where it originated. From a forensic point of view it is...
Atif Ahmad, Tobias Ruighaver