Sciweavers

948 search results - page 15 / 190
» Analysis of SITA policies
Sort
View
HICSS
2003
IEEE
154views Biometrics» more  HICSS 2003»
15 years 3 months ago
Applying the normative aspect of stakeholder analysis to electronic commerce diffusion: Stakeholder consideration for the elimin
The digital divide between developed and non-developed countries or large and smaller companies in terms of adoption of new technologies and particularly the Internet and electron...
Anastasia Papazafeiropoulou, Athanasia Pouloudi
HICSS
2010
IEEE
161views Biometrics» more  HICSS 2010»
15 years 4 months ago
Analysis of Marginal Carbon Intensities in Constrained Power Networks
Jurisdictions across the globe are implementing CO2 emissions reduction policies. These policies typically ignore most locational issues, probably because the consequences of gree...
Pablo A. Ruiz, Aleksandr Rudkevich
CCS
2009
ACM
15 years 10 months ago
Expressive policy analysis with enhanced system dynamicity
Despite several research studies, the effective analysis of policy based systems remains a significant challenge. Policy analysis should at least (i) be expressive (ii) take accou...
Robert Craven, Jorge Lobo, Jiefei Ma, Alessandra R...
CCS
2007
ACM
15 years 1 months ago
Efficient policy analysis for administrative role based access control
Administrative RBAC (ARBAC) policies specify how Role-Based Access Control (RBAC) policies may be changed by each administrator. It is often difficult to fully understand the effe...
Scott D. Stoller, Ping Yang, C. R. Ramakrishnan, M...
CIS
2007
Springer
15 years 3 months ago
A Context-Based Analysis of Intrusion Detection for Policy Violation
Existing intrusion detection systems (IDS) operate independently from security policy enforcement mechanism. In current IDS the functionality has been restricted to detecting only...
Kaiyu Wan, Vasu S. Alagar, Zongyuan Yang