Sciweavers

831 search results - page 96 / 167
» A Security Concept for OLAP
Sort
View

Book
310views
16 years 7 months ago
Mastering Enterprise JavaBeans Third Edition
"Published in January 2005, the best-selling book Mastering EJB is now in its third edition and has been updated for EJB2.1 and also features new chapters on security and Web ...
Ed Roman, Rima Patel Sriganesh, and Gerald Brose
SEUS
2008
IEEE
15 years 6 months ago
A Two-Layered Management Architecture for Building Adaptive Real-Time Systems
The concepts of Autonomic and Organic Computing (AC/OC) promise to make modern computer systems more secure and easier to manage. In this paper, we extend the observer/controller a...
Florian Kluge, Sascha Uhrig, Jörg Mische, The...
SSS
2005
Springer
115views Control Systems» more  SSS 2005»
15 years 5 months ago
Code Stabilization
Dijkstra’s concept of self-stabilization assumes that faults can only affect the variables of a program. We study the notion of selfstabilization if faults can also affect (i.e...
Felix C. Freiling, Sukumar Ghosh
DEXAW
2003
IEEE
99views Database» more  DEXAW 2003»
15 years 5 months ago
A Model for Context-dependent Access Control for Web-based Services with Role-based Approach
Controlling access to resources is one of the most important protection goals for web-based services in practice. In general, access control requires identification of subjects t...
Ruben Wolf, Thomas Keinz, Markus Schneider
WECWIS
2003
IEEE
85views ECommerce» more  WECWIS 2003»
15 years 5 months ago
Intermediary Non-repudiation Protocols
In commercial transactions, an intermediary might be involved to help transacting parties to conduct their business. Nevertheless, the intermediary may not be fully trusted. In th...
Jose Antonio Onieva, Jianying Zhou, Mildrey Carbon...