Sciweavers

296 search results - page 17 / 60
» Policies and Roles in Collaborative Applications
Sort
View
HICSS
2002
IEEE
179views Biometrics» more  HICSS 2002»
15 years 4 months ago
Combined Modeling with Multi-agent Systems and Simulation: Its Application to Harbor Supply Chain Management
This paper presents a method for modeling the dynamic behavior of harbor supply chains and evaluating strategic and operational policies of the proposed harbor supply chain by app...
Dong Won Yi, Soung Hie Kim, Nak Hyun Kim
ICOIN
2003
Springer
15 years 5 months ago
A Network Management Architecture Using XML-Based Policy Information Base
XML is being used to describe components and applications in a vendor and language neutral. Therefore it already has a role in distributed system. XML is also being used as a data ...
Kwoun Sup Youn, Choong Seon Hong
214
Voted
ECOOP
2009
Springer
16 years 11 days ago
Fine-Grained Access Control with Object-Sensitive Roles
Role-based access control (RBAC) is a common paradigm to ensure that users have sufficient rights to perform various system operations. In many cases though, traditional RBAC does ...
Jeffrey Fischer, Daniel Marino, Rupak Majumdar, To...
JASIS
2010
129views more  JASIS 2010»
14 years 10 months ago
Science overlay maps: A new tool for research policy and library management
We present a novel approach to visually locate bodies of research within the sciences, both at each moment of time and dynamically. This article describes how this approach fits w...
Ismael Rafols, Alan L. Porter, Loet Leydesdorff
ISI
2004
Springer
15 years 5 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho