Sciweavers

8493 search results - page 272 / 1699
» Implementing a distributed firewall
Sort
View
ICEIS
2003
IEEE
15 years 9 months ago
A Multi-Level Architecture for Distributed Object Bases
Abstract: The work described in this article arises from two needs. First, there is still a need for providing more sophisticated database systems than just relational ones. Second...
Markus Kirchberg, Klaus-Dieter Schewe, Alexei Tret...
SAINT
2003
IEEE
15 years 9 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta
ILP
2003
Springer
15 years 9 months ago
Applying Theory Revision to the Design of Distributed Databases
This work presents the application of theory revision to the design of distributed databases to automatically revise a heuristic-based algorithm (called analysis algorithm) through...
Fernanda Araujo Baião, Marta Mattoso, Jude ...
ACSC
2002
IEEE
15 years 9 months ago
Bracket Capabilities for Distributed Systems Security
The per-method access control lists of standard middleware technologies allow only simple forms of access control to be expressed and enforced. Research systems based on capabilit...
Mark Evered
CODES
2002
IEEE
15 years 9 months ago
Holistic scheduling and analysis of mixed time/event-triggered distributed embedded systems
This paper deals with specific issues related to the design of distributed embedded systems implemented with mixed, eventtriggered and time-triggered task sets, which communicate ...
Traian Pop, Petru Eles, Zebo Peng