Buscar
Mostrando ítems 11-20 de 21
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Efficient data structures for local inconsistency detection in firewall ACL updates
(SciTePress, 2009)
Filtering is a very important issue in next generation networks. These networks consist of a relatively high number of resource constrained devices and have special features, such as management of frequent topology ...
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Automating correctness verification of artifact-centric business process models
(Elsevier, 2015)
Context: The artifact-centric methodology has emerged as a new paradigm to support business process management over the last few years. This way, business processes are described from the point of view of the artifacts ...
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Formalization of security patterns as a means to infer security controls in business processes
(Oxford University Press, 2015)
The growing trend towards the automation and externalization of business processes by means of Technology Infrastructure (TI), such as Business Process Management Systems, has increased the security risks in the organizations. ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
A Quadratic, Complete, and Minimal Consistency Diagnosis Process for Firewall ACLs
(IEEE Computer Society, 2010)
Developing and managing firewall Access Control Lists (ACLs) are hard, time-consuming, and error-prone tasks for a variety of reasons. Complexity of networks is constantly increasing, as it is the size of firewall ...
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Diagnosing correctness of semantic workflow models
(Elsevier, 2013)
To model operational business processes in an accurate way, workflow models need to reference both the control flow and dataflow perspectives. Checking the correctness of such workflow models and giving precise feedback ...
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Fault Tolerance Framework using Model-Based Diagnosis: Towards Dependable Business Processes
(International Academy, Research, and Industry Association (IARIA), 2011)
Several reports indicate that one of the most important business priorities is the improvement of business and IT management. Management and automation of business processes have become essential tasks within IT ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Polynomial Heuristic Algorithms for Inconsistency Characterization in Firewall Rule Sets
(IEEE Computer Society, 2008)
Firewalls provide the first line of defence of nearly all networked institutions today. However, Firewall ACLs could have inconsistencies, allowing traffic that should be denied or vice versa. In this paper, we analyze ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Fast algorithms for consistency-based diagnosis of firewall rule sets
(IEEE Computer Society, 2008)
Firewalls provide the first line of defence of nearly all networked institutions today. However, Firewall ACL management suffer some problems that need to be addressed in order to be effective. The most studied one is ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
MDA-Based Framework for Automatic Generation of Consistent Firewall ACLs with NAT
(Springer, 2009)
The design and management of firewall ACLs is a very hard and er ror-prone task. Part of this complexity comes from the fact that each firewall platform has its own low-level language with a different functionality, ...
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Minimizing test-point allocation to improve diagnosability in business process models
(Elsevier, 2013)
Diagnosability analysis aims to determine whether observations available during the execution of a sys-tem are sufficient to precisely locate the source of a problem. Previous work deals with the diagnosabilityproblem in ...