Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Matteo Maria Casalino"'
Publikováno v:
SIGMOD Conference
SIGMOD Record
SIGMOD '20: Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data
SIGMOD Record
SIGMOD '20: Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data
Business Rule Management Systems (BRMSs) are widely used in industry for a variety of tasks. Their main advantage is to codify in a succinct and queryable manner vast amounts of constantly evolving logic. In BRMSs, rules are typically captured as fac
Autor:
Edward G. Amoroso, Jeffrey S. Bardin, Cataldo Basile, Stefan Berthold, Gerald Beuchelt, Rahul Bhaskar, Chiara Braghin, Albert Caballero, Matteo Maria Casalino, Erdal Cayirci, Thomas M. Chen, Hongbing Cheng, Lauren Collins, Marco Cremonini, Samuel J.J. Curry, Rozita Dara, Christopher Day, Sabrina De Capitani di Vimercati, Tewfiq El Maliki, Scott R. Ellis, Michael Erbschloe, Simone Fischer-Hbner, Sara Foresti, Errin W. Fulp, Angelo Genovese, Anna Granova, William F. Gross, Yong Guan, Cem Gurkok, Feng Hao, Tarfa Hamed, James T. Harmening, Rich Hoffman, Emin Huseynov, Markus Jakobsson, Ravi Jhawar, Almantas Kakareka, Bhushan Kapoor, Sokratis K. Katsikas, Dalia Khader, John Benjamin Khan, Larry Korba, Kameswari Kotapati, Stefan C. Kremer, Thomas F. LaPorta, Jean Lencrenon, Keith Lewis, Peng Liu, Giovanni Livraga, John R. Mallery, Bill Mansoor, Luther Martin, John McDonald, John McGowan, Nailah Mims, Simone Mutti, Peter F. Nicoletti, Kevin Noble, Pramod Pandya, Harsh Kupwade Patil, Stefano Paraboschi, Thea Peacock, Ken Perkins, Vincenzo Piuri, Henrik Plate, James Pooley, Chunming Rong, Robert Rounsavall, Peter Y.A. Ryan, Pierangela Samarati, Marco Santambrogio, Mario Santana, Steve Schneider, Fabio Scotti, Jean-Marc Seigneur, Marco Slaviero, Daniel S. Soper, Terence Spies, William Stallings, Alex Tsow, Jesse Walker, Michael A. West, Dan Wing, George O.M. Yee, Liang Yan, Roman Zabicki, Gansen Zhao, Zhe Zias
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::499603800871b1c5e5e1573afaf79d52
https://doi.org/10.1016/b978-0-12-803843-7.01002-4
https://doi.org/10.1016/b978-0-12-803843-7.01002-4
Publikováno v:
Software: Practice and Experience. 43:1489-1518
SUMMARY Certificate validation, one of the most important and complex tasks in Public Key Infrastructures, is still a challenging topic nowadays because of the scalability and complexity issues related to this process. Validation of an X.509 certific
Publikováno v:
On the Move to Meaningful Internet Systems: OTM 2014 Workshops ISBN: 9783662455494
OTM Workshops
OTM Workshops
Cloud scenarios are a flexible and scalable solution for the creation, provisioning and consumption of services. Service providers and consumers typically decide and negotiate requirements for their services. However, as these are operated by the clo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d9d4e3022dc589fdd22641acb011fd1f
https://doi.org/10.1007/978-3-662-45550-0_22
https://doi.org/10.1007/978-3-662-45550-0_22
Autor:
Matteo Maria Casalino, Romuald Thion
Publikováno v:
International Conference on Network and Service Management (CNSM)
International Conference on Network and Service Management (CNSM), Oct 2013, Zürich, Switzerland. pp.243-250, ⟨10.1109/CNSM.2013.6727843⟩
CNSM
International Conference on Network and Service Management (CNSM), Oct 2013, Zürich, Switzerland. pp.243-250, ⟨10.1109/CNSM.2013.6727843⟩
CNSM
International audience; Policy-based access control is a well-established paradigm for securing layered IT systems. Access control policies, however, often do not focus on dedicated architecture layers, but increasingly employ concepts of multiple la
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3101cf3477f57d506f287ba810cf8ba7
https://hal.archives-ouvertes.fr/hal-01339261
https://hal.archives-ouvertes.fr/hal-01339261
Publikováno v:
Data Privacy Management and Autonomous Spontaneous Security ISBN: 9783642358890
DPM/SETOP
DPM/SETOP
Security of systems is most often compromised by misconfiguration rather than a lack of security mechanisms. As a result, configuration validation is of utmost importance within organizations. However, security policies, best-practices, and documenta
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::454e9afd3f202b9f381f4d72c1799273
https://doi.org/10.1007/978-3-642-35890-6_16
https://doi.org/10.1007/978-3-642-35890-6_16
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783642368820
SecureComm
SecureComm
Many tools and libraries are readily available to build and operate distributed Web applications. While the setup of operational environments is comparatively easy, practice shows that their continuous secure operation is more difficult to achieve, m
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c37752a0faa300f291327db4cc660495
https://doi.org/10.1007/978-3-642-36883-7_9
https://doi.org/10.1007/978-3-642-36883-7_9
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783642281655
ESSoS
ESSoS
Declarative policies are a common means to manage the security of complex IT environments and they belong to different, heterogeneous classes (access control, filtering, data protection, etc.). Their enforcement requires the selection and configurati
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::473b67863e818603b88290dbdeda01fd
https://doi.org/10.1007/978-3-642-28166-2_4
https://doi.org/10.1007/978-3-642-28166-2_4