Sciweavers

1611 search results - page 302 / 323
» An Access Control Model for Video Database Systems
Sort
View
79
Voted
EDO
2005
Springer
15 years 3 months ago
Optimizing layered middleware
Middleware is often built using a layered architectural style. Layered design provides good separation of the different concerns of middleware, such as communication, marshaling, ...
Ömer Erdem Demir, Premkumar T. Devanbu, Eric ...
ISI
2004
Springer
15 years 3 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
MMMACNS
2001
Springer
15 years 2 months ago
Typed MSR: Syntax and Examples
Abstract. Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Archit...
Iliano Cervesato
CSFW
2009
IEEE
15 years 1 months ago
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions
We present the design and implementation of a compiler that, given high-level multiparty session descriptions, generates custom cryptographic protocols. Our sessions specify pre-a...
Karthikeyan Bhargavan, Ricardo Corin, Pierre-Malo ...
AINA
2004
IEEE
15 years 1 months ago
An Overlay Network Architecture for Data Placement Strategies in a P2P Streaming Network
Abstract--Generic file sharing P2P applications have gained high popularity in the past few years. In particular P2P streaming architectures have attracted attention. Some of them ...
Kan Hung Wan, Chris Loeser