Sciweavers

1324 search results - page 143 / 265
» Automation Controller for Operational IT Management
Sort
View
SACMAT
2006
ACM
15 years 9 months ago
Constraint generation for separation of duty
Separation of Duty (SoD) is widely recognized to be a fundamental principle in computer security. A Static SoD (SSoD) policy states that in order to have all permissions necessary...
Hong Chen, Ninghui Li
137
Voted
ATAL
2010
Springer
15 years 4 months ago
A systematic agent framework for situated autonomous systems
We present a formal framework of an autonomous agent as a collection of coordinated control loops, with a recurring sense, plan, act cycle. Our framework manages the information f...
Frederic Py, Kanna Rajan, Conor McGann
111
Voted
SRDS
2003
IEEE
15 years 9 months ago
Pesto Flavoured Security
We demonstrate that symmetric-key cryptography can be used for both read and write access control. One-time write access can be granted by handing over an encryption key, and our ...
Feike W. Dillema, Tage Stabell-Kulø
134
Voted
HICSS
2003
IEEE
110views Biometrics» more  HICSS 2003»
15 years 9 months ago
Telecommunication Infrastructure Investments and Firm Performance
This research adopts Barua’s [1] three-tier Business Value Complementarity (BVC) model to study the performance of telephone companies (Telcos). Our study integrates constructs ...
Hy Sonya Hsu, Siva K. Balasubramanian
158
Voted
ALP
1992
Springer
15 years 7 months ago
Definitional Trees
Rewriting is a computational paradigm that specifies the actions, but not the control. We introduce a hierarchical structure repreat a high level of abstraction, a form of control....
Sergio Antoy