Sciweavers

294 search results - page 47 / 59
» Intrusion Monitoring in Process Control Systems
Sort
View
CAISE
2010
Springer
14 years 12 months ago
Dynamic Authorisation Policies for Event-Based Task Delegation
Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are tw...
Khaled Gaaloul, Ehtesham Zahoor, François C...
FAST
2004
15 years 1 months ago
A Versatile and User-Oriented Versioning File System
File versioning is a useful technique for recording a history of changes. Applications of versioning include backups and disaster recovery, as well as monitoring intruders' a...
Kiran-Kumar Muniswamy-Reddy, Charles P. Wright, An...
CVPR
2000
IEEE
16 years 1 months ago
Statistical Modeling and Performance Characterization of a Real-Time Dual Camera Surveillance System
The engineering of computer vision systems that meet application speci c computational and accuracy requirements is crucial to the deployment of real-life computer vision systems....
Michael Greiffenhagen, Visvanathan Ramesh, Dorin C...
POPL
2012
ACM
13 years 7 months ago
A compiler and run-time system for network programming languages
Software-defined networks (SDNs) are a new implementation architecture in which a controller machine manages a distributed collection of switches, by instructing them to install ...
Christopher Monsanto, Nate Foster, Rob Harrison, D...
RIVF
2003
15 years 1 months ago
A Based-On Agent Framework For Home Networking
— Home networking is the collection of elements that process, manage, transport and store information, enabling the connection and integration of multiple computing, control, mon...
Si Hoàng Do, Marc Bui, Paul Kopff