Sciweavers

1167 search results - page 80 / 234
» policy 2007
Sort
View
DAGSTUHL
2001
15 years 1 months ago
A Language-Based Approach to Security
Abstract. Language-based security leverages program analysis and program rewriting to enforce security policies. The approach promises efficient enforcement of fine-grained access ...
Fred B. Schneider, J. Gregory Morrisett, Robert Ha...
AUTOMATICA
2005
92views more  AUTOMATICA 2005»
14 years 11 months ago
Control of manufacturing systems with a two-value, production-dependent failure rate
In this paper we consider a failure prone, single machine, single part-type, limited inventory, manufacturing system subject to a non-homogeneous Markov failure/repair process wit...
Francesco Martinelli
EDOC
2007
IEEE
15 years 6 months ago
Business Process Integration by Using General Rule Markup Language
A business process usually includes multiple business partners that use systems with their business logics represented in different rule (or policy) languages. The integration of ...
Milan Milanovic, Nima Kaviani, Dragan Gasevic, Adr...
DSS
2007
124views more  DSS 2007»
14 years 12 months ago
Access control in collaborative commerce
Corporate collaboration allows organizations to improve the efficiency and quality of their business activities. It may occur as a workflow collaboration, a supply chain collabora...
Eldon Y. Li, Timon C. Du, Jacqueline W. Wong
CASES
2007
ACM
15 years 3 months ago
Cache leakage control mechanism for hard real-time systems
Leakage energy consumption is an increasingly important issue as the technology continues to shrink. Since on-chip caches constitute a major portion of the processor's transi...
Jaw-Wei Chi, Chia-Lin Yang, Yi-Jung Chen, Jian-Jia...