Sciweavers

1706 search results - page 277 / 342
» Functions of a Web Warehouse
Sort
View
DISCEX
2003
IEEE
15 years 3 months ago
Dynamic Authorization and Intrusion Response in Distributed Systems
This paper¢ presents an authorization framework for supporting fine-grained access control policies enhanced with light-weight intrusion/misuse detectors and response capabiliti...
Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim
HICSS
2003
IEEE
112views Biometrics» more  HICSS 2003»
15 years 3 months ago
Applying the Task-Technology Fit Model to WWW-based Procurement: Conceptualization and Measurement
This research examines the application of the tasktechnology fit (TTF) model to World Wide Web (WWW) usage for electronic commerce (EC) purposes. Conducted from corporate buyers...
Younes Benslimane, Michel Plaisent, Prosper Bernar...
ISSRE
2003
IEEE
15 years 3 months ago
A Framework for Tamper Detection Marking of Mobile Applications
Today’s applications are highly mobile; we download software from the Internet, machine executable code arrives attached to electronic mail, and Java applets increase the functi...
Mike Jochen, Lisa M. Marvel, Lori L. Pollock
NDSS
2003
IEEE
15 years 3 months ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet
DOCENG
2003
ACM
15 years 3 months ago
Set-at-a-time access to XML through DOM
To support the rapid growth of the web and e-commerce, W3C developed DOM as an application programming interface that the abstract, logical tree structure of an XML document. In t...
Hai Chen, Frank Wm. Tompa