Sciweavers

330 search results - page 40 / 66
» A Policy Language for Integrating Heterogeneous Authorizatio...
Sort
View
ICIW
2008
IEEE
15 years 8 months ago
Leveraging Integrated Tools for Model-Based Analysis of Service Compositions
—Developing service compositions, using multiple standards and implementation techniques, typically involves specifying service characteristics in different languages and tools. ...
Howard Foster, Philip Mayer
101
Voted
FPGA
2004
ACM
137views FPGA» more  FPGA 2004»
15 years 7 months ago
Multi-resource aware partitioning algorithms for FPGAs with heterogeneous resources
As FPGA densities increase, partitioning-based FPGA placement approaches are becoming increasingly important as they can be used to provide high-quality and computationally scalab...
Navaratnasothie Selvakkumaran, Abhishek Ranjan, Sa...
SIGADA
2004
Springer
15 years 7 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
126
Voted
ICDCIT
2004
Springer
15 years 7 months ago
Using Schemas to Simplify Access Control for XML Documents
Abstract. Organizations are increasingly using the the eXtensible Markup Language (XML) for document representation and exchange on the Web. To protect an XML document from unautho...
Indrakshi Ray, Marianna Muller
104
Voted
CN
1999
93views more  CN 1999»
15 years 1 months ago
Bro: a system for detecting network intruders in real-time
We describe Bro, a stand-alone system for detecting network intruders in real-time by passively monitoring a network link over which the intruder's traffic transits. We give ...
Vern Paxson