Sciweavers

1324 search results - page 121 / 265
» Automation Controller for Operational IT Management
Sort
View
SACMAT
2010
ACM
15 years 2 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
65
Voted
DSOM
2007
Springer
15 years 4 months ago
Virtualized Interoperability Testing: Application to IPv6 Network Mobility
Interoperability testing is an inherently distributed task. It connects different implementations together and determines if they interact according to their specifications, prov...
Ariel Sabiguero, Anthony Baire, Antoine Boutet, C&...
AQUILEIA
2011
117views more  AQUILEIA 2011»
13 years 10 months ago
Integrated Archaeological Investigations for the Study of the Greater Aquileia Area
A large number of technologies, such as Geographic Information Systems (GIS), Global Positioning Systems (GPS), Remote Sensing (RS), geophysical instruments, allows nowadays for fa...
Arianna Traviglia
COOPIS
2004
IEEE
15 years 1 months ago
Dynamic Access Control for Ubiquitous Environments
Current ubiquitous computing environments provide many kinds of information. This information may be accessed by different users under varying conditions depending on various conte...
Jehan Wickramasuriya, Nalini Venkatasubramanian
AGILEDC
2003
IEEE
15 years 3 months ago
Agile Development in the old economy
As part of the delivery an automated hub for a postal operator, the Solystic company has to build a complex and feature rich Information System that supports a highly automated pr...
Géry Derbier