Sciweavers

41 search results - page 2 / 9
» Test-Driven Assessment of Access Control in Legacy Applicati...
Sort
View
XPU
2004
Springer
13 years 11 months ago
An Agile Approach to a Legacy System
We describe how a small, successful, self-selected XP team approached a seemingly intractable problem with panache, flair and immodesty. We rewrote a legacy application by deliver...
Chris Stevenson, Andy Pols
WOWMOM
2006
ACM
111views Multimedia» more  WOWMOM 2006»
13 years 11 months ago
A New MAC Scheme for Very High-Speed WLANs
We consider the medium access control (MAC) layer for very high-speed Wireless LANs, which is designed to support rich multimedia applications such as highdefinition television. ...
Tianji Li, Qiang Ni, David Malone, Douglas J. Leit...
IEEEARES
2010
IEEE
14 years 21 days ago
Strategies for Reducing Risks of Inconsistencies in Access Control Policies
—Managing access control policies is a complex task. We argue that much of the complexity is unnecessary and mostly due to historical reasons. There are number of legacy policy s...
Bernard Stepien, Stan Matwin, Amy P. Felty
CN
2007
146views more  CN 2007»
13 years 5 months ago
Autonomic control and personalization of a wireless access network
As ICT services are becoming more ubiquitous and mobile and access technologies grow to be more heterogeneous and complex, we are witnessing the increasing importance of two relat...
Nicola Blefari-Melazzi, Dario Di Sorte, Mauro Femm...
CCS
2007
ACM
14 years 1 hour ago
A flexible security architecture to support third-party applications on mobile devices
The problem of supporting the secure execution of potentially malicious third-party applications has received a considerable amount of attention in the past decade. In this paper ...
Lieven Desmet, Wouter Joosen, Fabio Massacci, Kats...