Sciweavers

704 search results - page 37 / 141
» Building Distributed Access Control System Using Service-Ori...
Sort
View
78
Voted
JLP
2010
73views more  JLP 2010»
14 years 7 months ago
Composing model programs for analysis
Model programs are high-level behavioral specifications used for software testing and design analysis. Composition of model programs is a versatile technique that, at one end of t...
Margus Veanes, Jonathan Jacky
83
Voted
ICDCSW
2005
IEEE
15 years 6 months ago
Policy-Controlled Event Management for Distributed Intrusion Detection
A powerful strategy in intrusion detection is the separation of surveillance mechanisms from a site’s policy for processing observed events. The Bro intrusion detection system h...
Christian Kreibich, Robin Sommer
118
Voted
MA
2000
Springer
114views Communications» more  MA 2000»
15 years 4 months ago
Saving Energy and Providing Value Added Services in Intelligent Buildings: A MAS Approach
In a de-regulated market the distribution utilities will compete with added value for the customer in addition to the delivery of energy. We describe a system consisting of a colle...
Paul Davidsson, Magnus Boman
131
Voted
XMLSEC
2003
ACM
15 years 5 months ago
An access control framework for business processes for web services
Business Processes for Web Services are the new paradigm for the lightweight integration of business from different enterprises. Whereas the security and access control policies ...
Hristo Koshutanski, Fabio Massacci
112
Voted
DELOS
2004
15 years 1 months ago
Peer-to-Peer Overlays and Data Integration in a Life Science Grid
Databases and Grid computing are a good match. With the service orientation of Grid computing, the complexity of maintaining and integrating databases can be kept away from the act...
Curt Cramer, Andrea Schafferhans, Thomas Fuhrmann