Sciweavers

2655 search results - page 126 / 531
» Event Systems and Access Control
Sort
View
IEEESCC
2008
IEEE
15 years 11 months ago
Adaptive Secure Access to Remote Services
Since the inception of service-oriented computing paradigm, we have witnessed a plethora of services deployed across a broad spectrum of applications, ranging from conventional RP...
Hanping Lufei, Weisong Shi, Vipin Chaudhary
MOBISYS
2007
ACM
16 years 4 months ago
A time-and-value centric provenance model and architecture for medical event streams
Provenance becomes a critical requirement for healthcare IT infrastructures, especially when pervasive biomedical sensors act as a source of raw medical streams for large-scale, a...
Min Wang, Marion Blount, John Davis, Archan Misra,...
151
Voted
ICCS
2001
Springer
15 years 9 months ago
The Policy Machine for Security Policy Management
Abstract. Many different access control policies and models have been developed to suit a variety of goals; these include Role-Based Access Control, One-directional Information Flo...
Vincent C. Hu, Deborah A. Frincke, David F. Ferrai...
SOCA
2007
IEEE
15 years 11 months ago
VIDIHIP - A Web Service based Integration Platform for Power Plant Control Systems
European energy supply companies typically run a conglomerate of different, geographically distributed power plants. Unfortunately, the corresponding power plant control systems a...
Mark Strembeck, Otto U. Plhal
143
Voted
HOTOS
1997
IEEE
15 years 9 months ago
Security for Extensible Systems
The recent trend towards dynamically extensible systems, such as Java, SPIN or VINO, promises more powerful and flexible systems. At the same time, the impact of extensibility on...
Robert Grimm, Brian N. Bershad