Sciweavers

1906 search results - page 244 / 382
» Dependable Self-Hosting Distributed Systems Using Constraint...
Sort
View
DBSEC
2009
163views Database» more  DBSEC 2009»
15 years 5 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
ECIS
2004
15 years 5 months ago
Activity Based generation of requirements for web-based information systems: the SSM/ICDT approach
Web site development method is at an early stage in its evolution. Most existing methods are concerned with technical software issues and are poorly adapted to help developers thi...
Mary Meldrum, Jeremy Rose
EXPERT
2006
107views more  EXPERT 2006»
15 years 4 months ago
Provenance in Agent-Mediated Healthcare Systems
Agent-oriented cooperation techniques and standardized electronic healthcare record exchange protocols can be used to combine information regarding different facets of a therapy re...
Tamás Kifor, László Zsolt Var...
SP
1999
IEEE
145views Security Privacy» more  SP 1999»
15 years 8 months ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo
TII
2008
169views more  TII 2008»
15 years 4 months ago
Fine-Tuning MAC-Level Protocols for Optimized Real-Time QoS
In distributed real-time systems, meeting the real-time constraints is mandatory but the satisfaction of other application-dependent criteria is most generally required as well. I...
Mathieu Grenier, Nicolas Navet