Sciweavers

1117 search results - page 169 / 224
» A Compliance Model of Trust
Sort
View
EON
2008
15 years 1 months ago
Abductive Synthesis of the Mediator Scenario with jABC and GEM
We reuse here the framework, the setting, and the semantic modelling for the automated synthesis of the SWS Challenge Mediator presented in the companion paper [5], and show how to...
Christian Kubczak, Tiziana Margaria, Matthias Kais...
IMCS
2007
77views more  IMCS 2007»
14 years 11 months ago
Incident response requirements for distributed security information management systems
Purpose – Security information management systems (SIMs) have been providing a unified distributed platform for the efficient management of security information produced by co...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...
SIAMREV
2010
108views more  SIAMREV 2010»
14 years 6 months ago
Market Design for Emission Trading Schemes
Abstract. The main thrust of the paper is the design and the numerical analysis of new capand-trade schemes for the control and the reduction of atmospheric pollution. The tools de...
René Carmona, Max Fehr, Juri Hinz, Arnaud P...
TISSEC
2010
142views more  TISSEC 2010»
14 years 6 months ago
A logical specification and analysis for SELinux MLS policy
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...
SACMAT
2011
ACM
14 years 2 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we de...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...