-
2
-
-
0031331432
-
Verification, validation, and accreditation of simulation models
-
Balci, O. 1997. Verification, validation, and accreditation of simulation models. In Proceedings of the 1997 Winter Simulation Conference, pp. 135-141.
-
(1997)
Proceedings of the 1997 Winter Simulation Conference
, pp. 135-141
-
-
Balci, O.1
-
3
-
-
84993776152
-
Defense Modeling and Simulation Office Foundation 02 V&V Workshop
-
Defense Modeling and Simulation Office Foundation 02 V&V Workshop. http://www.dmso.mil/public/transition/vva/foundations
-
-
-
-
5
-
-
0032255085
-
Validation and verification of the simulation model of a photolithography process in semiconductor manufacturing
-
Nayani, N., and M. Mollaghasemi. 1998. Validation and verification of the simulation model of a photolithography process in semiconductor manufacturing. In Proceedings of the 1998 Winter Simulation Conference, pp. 1017-1022.
-
(1998)
Proceedings of the 1998 Winter Simulation Conference
, pp. 1017-1022
-
-
Nayani, N.1
Mollaghasemi, M.2
-
7
-
-
36749056132
-
-
BizTalk Server Policy. 2002. http://msdn.microsoft.com/library/default.asp?url=/library/en-us/sdk/htm/ebiz_prog_rules_xxxf.asp
-
(2002)
BizTalk Server Policy
-
-
-
11
-
-
5444242493
-
-
Technical report, Department of Computing at Imperial College of Science Technology and Medicine
-
Damianou, N., A. Bandara, M. Sloman, and E. Lupu. 2002. A survey of policy specification approaches. Technical report, Department of Computing at Imperial College of Science Technology and Medicine.
-
(2002)
A survey of policy specification approaches
-
-
Damianou, N.1
Bandara, A.2
Sloman, M.3
Lupu, E.4
-
12
-
-
1542597501
-
-
Technical report, Department of Computer Science at University of California, Davis, July
-
Hoagland, J., R. Pandey, and K. Levitt. 1998. Security policy specification using a graphical approach. Technical report, Department of Computer Science at University of California, Davis, July.
-
(1998)
Security policy specification using a graphical approach
-
-
Hoagland, J.1
Pandey, R.2
Levitt, K.3
-
13
-
-
33748516024
-
Java policy implementation and policy file syntax
-
Java policy implementation and policy file syntax. http://java.sun.com/j2se/1.4.2/docs/guide/security/PolicyFiles.html
-
-
-
-
15
-
-
27544497210
-
-
Technical report, Department of Computer Science at Helsinki University of Technology, November
-
Kangasluoma, M. 1999. Policy specification languages. Technical report, Department of Computer Science at Helsinki University of Technology, November.
-
(1999)
Policy specification languages
-
-
Kangasluoma, M.1
-
16
-
-
27544438700
-
-
Technical report, Department of Computer Science at Columbia University, May
-
Locasto, M. 2003. SPCL: Structured policy command language. Technical report, Department of Computer Science at Columbia University, May.
-
(2003)
SPCL: Structured policy command language
-
-
Locasto, M.1
-
17
-
-
0004198635
-
-
3rd ed. Englewood Cliffs, NJ: Prentice Hall
-
Pfleeger, C. 2003. Security in computing. 3rd ed. Englewood Cliffs, NJ: Prentice Hall.
-
(2003)
Security in computing
-
-
Pfleeger, C.1
-
22
-
-
84993693587
-
IBM, BEA Systems, Microsoft, SAP AG, Sonic Software, and VeriSign
-
IBM, BEA Systems, Microsoft, SAP AG, Sonic Software, and VeriSign. Web service policy framework. http://www-128.ibm.com/developerworks/library/specification/ws-polfram/
-
Web service policy framework
-
-
-
24
-
-
33845494507
-
A robust testing framework for verifying Web services by completeness and consistency analysis
-
IEEE International Workshop on Service-Oriented System Engineering (SOSE)October
-
Tsai, W. T., X. Wei, and Y. Chen. 2005. A robust testing framework for verifying Web services by completeness and consistency analysis. In IEEE International Workshop on Service-Oriented System Engineering (SOSE), October, Beijing, pp. 151-158.
-
(2005)
, pp. 151-158
-
-
Tsai, W.T.1
Wei, X.2
Chen, Y.3
-
25
-
-
30344475769
-
Developing and assuring trustworthy Web services
-
In the 7th International Symposium on Autonomous Decentralized Systems (ISADS)
-
Tsai, W. T., X. Wei, Y. Chen, B. Xiao, R. Paul, and H. Huang. 2005. Developing and assuring trustworthy Web services. In the 7th International Symposium on Autonomous Decentralized Systems (ISADS), April, pp. 160-167.
-
(2005)
, pp. 160-167
-
-
Tsai, W.T.1
Wei, X.2
Chen, Y.3
Xiao, B.4
Paul, R.5
Huang, H.6
-
26
-
-
27544442301
-
Dynamic simulation verification and validation by policy enforcement
-
In the 38th Annual Simulation Symposium, San Diego
-
Tsai, W. T., X. Liu, Y. Chen, and R. Paul. 2005. Dynamic simulation verification and validation by policy enforcement. In the 38th Annual Simulation Symposium, April, San Diego, pp. 91-98.
-
(2005)
, pp. 91-98
-
-
Tsai, W.T.1
Liu, X.2
Chen, Y.3
Paul, R.4
-
28
-
-
0030086382
-
Role-based access control models
-
Sandhu, R., E. Coyne, H. Feinstein, and C. Youman. 1996. Role-based access control models. IEEE Computer 29(2): 38-42.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-42
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
29
-
-
0141972444
-
RBAC models: Concepts and trends
-
Bertino, E. 2003. RBAC models: Concepts and trends. Computers & Security 22(6): 511-514.
-
(2003)
Computers & Security
, vol.22
, Issue.6
, pp. 511-514
-
-
Bertino, E.1
-
30
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
Osborn, S., R. Sandhu, and Q. Nunawer. 2000. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security 3(2): 85-106.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.2
, pp. 85-106
-
-
Osborn, S.1
Sandhu, R.2
Nunawer, Q.3
-
31
-
-
0004144799
-
-
IETF, RFC 3060, February
-
Moore, B., E. Ellesson, J. Strassner, and A. Westerinen. 2001. Policy core information model—Version 1 specification. IETF, RFC 3060, February.
-
(2001)
Policy core information model—Version 1 specification
-
-
Moore, B.1
Ellesson, E.2
Strassner, J.3
Westerinen, A.4
-
32
-
-
33746860250
-
DDSOS: A dynamic distributed service-oriented simulation framework
-
Huntsville, AL
-
Tsai, W. T., C. Fan, Y. Chen, and R. Paul. 2006. DDSOS: A dynamic distributed service-oriented simulation framework. In Proceedings of the 39th Annual Simulation Symposium (ANSS), April, Huntsville, AL, pp. 160-167.
-
(2006)
Proceedings of the 39th Annual Simulation Symposium (ANSS)
, pp. 160-167
-
-
Tsai, W.T.1
Fan, C.2
Chen, Y.3
Paul, R.4
-
36
-
-
80052698976
-
LUA programming language
-
LUA programming language. www.lua.org/
-
-
-
|