Sciweavers

3370 search results - page 638 / 674
» Adding Networks
Sort
View
ACSAC
1998
IEEE
15 years 4 months ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu
ECOOPW
1998
Springer
15 years 3 months ago
Role-Based Protection and Delegation for Mobile Object Environments
PrincipalDomain is an administrative scoping construct for establishing security policies based on the principals invoking object services that may entail objects moving around a ...
Nataraj Nagaratnam, Doug Lea
AUSAI
2006
Springer
15 years 3 months ago
Detecting Anomalies and Intruders
Brittleness is a well-known problem in expert systems where a conclusion can be made, which human common sense would recognise as impossible e.g. that a male is pregnant. We have e...
Akara Prayote, Paul Compton
EEE
2004
IEEE
15 years 3 months ago
e-Transformation Technologies: Case Studies and the Road Ahead - A Value Chain Perspective
e-Transformation technologies, for the past few years, have been evolving towards the goal of information integration and system interoperability. While there is no doubt that int...
William Kwok-Wai Cheung
AFRIGRAPH
2001
ACM
15 years 3 months ago
Experiences in porting a virtual reality system to Java
Practical experience in porting a large virtual reality system from C/C++ to Java indicates that porting this type of real-time application is both feasible, and has several merit...
Shaun Bangay