Sciweavers

2655 search results - page 149 / 531
» Event Systems and Access Control
Sort
View
137
Voted
CAISE
2004
Springer
15 years 10 months ago
Business Alignment: Using Process Mining as a Tool for Delta Analysis
Fueled by the omnipresence of event logs in transactional information systems (cf. WFM, ERP, CRM, SCM, and B2B systems), process mining has become a vivid research area. Until rece...
Wil M. P. van der Aalst
117
Voted
POLICY
2009
Springer
15 years 11 months ago
In Vivo Evolution of Policies that Govern a Distributed System
This paper addresses an important open problem confronting any decentralized and stateful access control (AC) mechanism for networked systems, particularly when the system at hand...
Constantin Serban, Naftaly H. Minsky
153
Voted
SIGCOMM
2006
ACM
15 years 11 months ago
A measurement study on the impact of routing events on end-to-end internet path performance
Extensive measurement studies have shown that end-to-end Internet path performance degradation is correlated with routing dynamics. However, the root cause of the correlation betw...
Feng Wang, Zhuoqing Morley Mao, Jia Wang, Lixin Ga...
180
Voted
SACMAT
2011
ACM
14 years 7 months ago
An approach to modular and testable security models of real-world health-care applications
t http://www.brucker.ch/bibliography/abstract/ brucker.ea-model-based-2011 by permission of ACM for your personal use. Not for redistribution. The definitive version was published...
Achim D. Brucker, Lukas Brügger, Paul Kearney...
131
Voted
CORR
2010
Springer
138views Education» more  CORR 2010»
15 years 3 months ago
Feedback control logic synthesis for non safe Petri nets
– This paper addresses the problem of forbidden states of non safe Petri Net (PN) modelling discrete events systems. To prevent the forbidden states, it is possible to use condit...
Abbas Dideban, Hassane Alla