Sciweavers

789 search results - page 93 / 158
» Pushing using Compliance
Sort
View
CAISE
2010
Springer
15 years 2 months ago
Monitoring and Analyzing Service-Based Internet Systems through a Model-Aware Service Environment
Abstract As service-based Internet systems get increasingly complex they become harder to manage at design time as well as at runtime. Nowadays, many systems are described in terms...
Ta'id Holmes, Uwe Zdun, Florian Daniel, Schahram D...
ETM
2010
257views Economy» more  ETM 2010»
15 years 2 months ago
Implementation and Performance Evaluation of the re-ECN Protocol
Re-inserted ECN (re-ECN) is a proposed TCP/IP extension that informs the routers on a path about the estimated level of congestion. The re-ECN protocol extends the Explicit Congest...
Mirja Kühlewind, Michael Scharf
110
Voted
CAISE
2010
Springer
15 years 1 months ago
Dynamic Authorisation Policies for Event-Based Task Delegation
Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are tw...
Khaled Gaaloul, Ehtesham Zahoor, François C...
CORR
2010
Springer
54views Education» more  CORR 2010»
15 years 1 months ago
Development of a Cargo Screening Process Simulator: A First Approach
The efficiency of current cargo screening processes at sea and air ports is largely unknown as few benchmarks exists against which they could be measured. Some manufacturers provi...
Peer-Olaf Siebers, Galina Sherman, Uwe Aickelin
CORR
2006
Springer
96views Education» more  CORR 2006»
15 years 1 months ago
The Evolution of Cyberinsurance
Cyberinsurance is a powerful tool to align market incentives toward improving Internet security. We trace the evolution of cyberinsurance from traditional insurance policies to ear...
Ruperto P. Majuca, William Yurcik, Jay P. Kesan