Sciweavers

1049 search results - page 92 / 210
» Change Management in Large-Scale Enterprise Information Syst...
Sort
View
BERTINORO
2005
Springer
15 years 7 months ago
Self-Management of Virtual Paths in Dynamic Networks
Abstract Virtual path management in dynamic networks poses a number of challenges related to combinatorial optimisation, fault and traffic handling. Ideally such management should ...
Poul E. Heegaard, Otto Wittner, Bjarne E. Helvik
SACMAT
2003
ACM
15 years 7 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
POLICY
2001
Springer
15 years 6 months ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
LISA
2007
15 years 4 months ago
PDA: A Tool for Automated Problem Determination
Problem determination remains one of the most expensive and time-consuming functions in system management due to the difficulty in automating what is essentially a highly experien...
Hai Huang, Raymond B. Jennings III, Yaoping Ruan, ...
110
Voted
SEAA
2008
IEEE
15 years 8 months ago
SEMF - Service Evolution Management Framework
With the growing popularity of Web services, an increasing number of Web services have been integrated into and used by complex service oriented systems. As a result, the manageme...
Martin Treiber, Hong Linh Truong, Schahram Dustdar