Sciweavers

330 search results - page 53 / 66
» A Policy Language for Integrating Heterogeneous Authorizatio...
Sort
View
CSFW
1999
IEEE
15 years 6 months ago
Secure Composition of Insecure Components
Software systems are becoming heterogeneous: instead of a small number of large programs from well-established sources, a user's desktop may now consist of many smaller compo...
Peter Sewell, Jan Vitek
110
Voted
JSSPP
1998
Springer
15 years 6 months ago
A Resource Management Architecture for Metacomputing Systems
Metacomputing systems are intended to support remote and/or concurrent use of geographically distributed computational resources. Resource management in such systems is complicate...
Karl Czajkowski, Ian T. Foster, Nicholas T. Karoni...
137
Voted
GRID
2006
Springer
15 years 1 months ago
Using Workflow for Dynamic Security Context Management in Grid-based Applications
This paper presents ongoing research and current results on the development of flexible access control infrastructures for complex resource provisioning in Grid-based collaborativ...
Yuri Demchenko, Leon Gommans, Cees de Laat, Arie T...
81
Voted
CHI
2008
ACM
16 years 2 months ago
E-imci: improving pediatric health care in low-income countries
Every year almost 10 million children die before reaching the age of five despite the fact that two-thirds of these deaths could be prevented by effective low-cost interventions. ...
Brian DeRenzi, Neal Lesh, Tapan S. Parikh, Clayton...
OTM
2007
Springer
15 years 8 months ago
Prevention of Cross-Site Scripting Attacks on Current Web Applications
Security is becoming one of the major concerns for web applications and other Internet based services, which are becoming pervasive in all kinds of business models and organization...
Joaquín García-Alfaro, Guillermo Nav...