Sciweavers

18697 search results - page 158 / 3740
» Systemic Security Management
Sort
View
ECOOPW
1999
Springer
15 years 9 months ago
Providing Policy-Neutral and Transparent Access Control in Extensible Systems
Extensible systems, such as Java or the SPIN extensible operating system, allow for units of code, or extensions, to be added to a running system in almost arbitrary fashion. Exte...
Robert Grimm, Brian N. Bershad
BDIM
2007
IEEE
72views Business» more  BDIM 2007»
15 years 11 months ago
Elevating the Discussion on Security Management: The Data Centric Paradigm
— Corporate decision makers have normally been disconnected from the details of the security management infrastructures of their organizations. The management of security resourc...
Tyrone Grandison, Marcel Bilger, L. O'Connor, M. G...
IPCCC
2006
IEEE
15 years 11 months ago
Enabling mobility in enterprise security management
The increasing demand for and the wide adoption of mobile technologies have been witnessed in enterprise information technology (IT) environments in recent years. However, there e...
William Claycomb, Dongwan Shin
OOPSLA
2007
Springer
15 years 11 months ago
Complexity management
Klaus Marquardt, Jens Coldewey, Lise B. Hvatum
SAFECOMP
2007
Springer
15 years 11 months ago
Formal Specification and Analysis of AFDX Redundancy Management Algorithms
Jan Täubrich, Reinhard von Hanxleden