Sciweavers

1353 search results - page 116 / 271
» Securing Current and Future Process Control Systems
Sort
View
DBSEC
2006
115views Database» more  DBSEC 2006»
15 years 4 months ago
Creating Objects in the Flexible Authorization Framework
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not ...
Nicola Zannone, Sushil Jajodia, Duminda Wijesekera
125
Voted
SACMAT
2009
ACM
15 years 10 months ago
Automating role-based provisioning by learning from examples
Role-based provisioning has been adopted as a standard component in leading Identity Management products due to its low administration cost. However, the cost of adjusting existin...
Qun Ni, Jorge Lobo, Seraphin B. Calo, Pankaj Rohat...
101
Voted
WSC
2000
15 years 4 months ago
Virtual machines for message based, real-time and interactive simulation
An advanced processing machine interacts with the material handling system, personnel and cell or shop floor controller in real-time via messaging and control. However, current si...
Hansoo Kim, Chen Zhou, Hua X. Du
148
Voted
AGENTS
2001
Springer
15 years 8 months ago
A multi-agent system for automated genomic annotation
Massive amounts of raw data are currently being generated by biologists while sequencing organisms. Outside of the largest, high-pro le projects such as the Human Genome Project, ...
Keith Decker, Xiaojing Zheng, Carl Schmidt
148
Voted
SACMAT
2005
ACM
15 years 9 months ago
Composing and combining policies under the policy machine
As a major component of any host, or network operating system, access control mechanisms come in a wide variety of forms, each with their individual attributes, functions, methods...
David F. Ferraiolo, Serban I. Gavrila, Vincent C. ...