Sciweavers

299 search results - page 48 / 60
» Re-engineering enterprise security
Sort
View
CIDR
2009
126views Algorithms» more  CIDR 2009»
14 years 11 months ago
Declarative Reconfigurable Trust Management
In recent years, there has been a proliferation of declarative logic-based trust management languages and systems proposed to ease the description, configuration, and enforcement ...
William R. Marczak, David Zook, Wenchao Zhou, Molh...
HICSS
2010
IEEE
155views Biometrics» more  HICSS 2010»
15 years 5 months ago
Experiences Validating the Access Policy Tool in Industrial Settings
—The Access Policy Tool (APT) analyzes the firewall configuration in an enterprise network for compliance with global access policy, e.g., such as describes the industry’s be...
David M. Nicol, William H. Sanders, Mouna Seri, Sa...
93
Voted
ICIW
2007
IEEE
15 years 4 months ago
Web Service Composition Approaches: From Industrial Standards to Formal Methods
Abstract— Composition of web services is much studied to support business-to-business and enterprise application integration in e-Commerce. Current web service composition approa...
Maurice H. ter Beek, Antonio Bucchiarone, Stefania...
ICEIS
1999
IEEE
15 years 2 months ago
Holonic Dynamic Scheduling Architecture and Services
: Manufacturing systems are changing its structure and organisation. Supply chain are evolving to more coupled organisations, like virtual enterprises, though maintaining the singl...
Nuno Silva, Carlos Ramos
92
Voted
COMPUTER
2002
196views more  COMPUTER 2002»
14 years 10 months ago
Grid Services for Distributed System Integration
ions and concepts that let applications access and share resources and services across distributed, wide area networks, while providing common security semantics, distributed resou...
Ian T. Foster, Carl Kesselman, Jeffrey M. Nick, St...