Sciweavers

2655 search results - page 49 / 531
» Event Systems and Access Control
Sort
View
JTRES
2010
ACM
15 years 4 months ago
Exhaustive testing of safety critical Java
With traditional testing, the test case has no control over non-deterministic scheduling decisions, and thus errors dependent on scheduling are only found by pure chance. Java Pat...
Tomás Kalibera, Pavel Parizek, Michal Maloh...
SACMAT
2010
ACM
15 years 9 months ago
An access control model for mobile physical objects
Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects’ trajectories. Existing access control models ca...
Florian Kerschbaum
ISCAS
2008
IEEE
101views Hardware» more  ISCAS 2008»
15 years 10 months ago
A serial communication infrastructure for multi-chip address event systems
— In recent years there have been an increasing number of research groups that have begun to develop multi-chip address-event systems. The communication protocol used to transmit...
Daniel Bernhard Fasnacht, Adrian M. Whatley, Giaco...
SACMAT
2005
ACM
15 years 9 months ago
Adaptive trust negotiation and access control
Electronic transactions regularly occur between business partners in separate security domains. Trust negotiation is an approach that provides an open authentication and access-co...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Travi...
ICWS
2009
IEEE
16 years 1 months ago
Service Provenance in QoS-Aware Web Service Runtimes
In general, provenance of electronic data represents an important issue in information systems. So far, Serviceoriented Computing research has mainly focused on provenance of data...
Anton Michlmayr, Florian Rosenberg, Philipp Leitne...