Sciweavers

351 search results - page 70 / 71
» Formalisation and implementation of Access control models
Sort
View
TES
2001
Springer
13 years 10 months ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...
NSDI
2004
13 years 7 months ago
Designing a DHT for Low Latency and High Throughput
Designing a wide-area distributed hash table (DHT) that provides high-throughput and low-latency network storage is a challenge. Existing systems have explored a range of solution...
Frank Dabek, Jinyang Li, Emil Sit, James Robertson...
AAAI
1998
13 years 7 months ago
OKBC: A Programmatic Foundation for Knowledge Base Interoperability
The technology for building large knowledge bases (KBs) is yet to witness a breakthrough so that a KB can be constructed by the assembly of prefabricated knowledge components. Kno...
Vinay K. Chaudhri, Adam Farquhar, Richard Fikes, P...
GD
2008
Springer
13 years 7 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
SIGMOD
2003
ACM
104views Database» more  SIGMOD 2003»
14 years 6 months ago
XML schema
The United States Environmental Protection Agency (EPA) prepares a national criteria and hazardous air pollutant (HAP) emission inventory with input from numerous states, local an...
Charles E. Campbell, Andrew Eisenberg, Jim Melton