Sciweavers

851 search results - page 84 / 171
» Managing (Requirements) Evolutions of High Assurance Systems
Sort
View
130
Voted
PODC
2003
ACM
15 years 7 months ago
Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures
Applications such as e-commerce payment protocols, electronic contract signing, and certified e-mail delivery require that fair exchange be assured. A fair-exchange protocol allo...
Jung Min Park, Edwin K. P. Chong, Howard Jay Siege...
ACSAC
2005
IEEE
15 years 7 months ago
Intrusion Detection in RBAC-administered Databases
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance security and privacy. An important componen...
Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athen...
IEEEAMS
2003
IEEE
15 years 7 months ago
Service Morphing: Integrated System- and Application-Level Service
Service morphing is a set of techniques used to continuously meet an application’s Quality of Service (QoS) needs, in the presence of run-time variations in service locations, p...
Christian Poellabauer, Karsten Schwan, Sandip Agar...
VLDB
1998
ACM
102views Database» more  VLDB 1998»
15 years 5 months ago
A Database System for Real-Time Event Aggregation in Telecommunication
Telecommunication networks process verylarge numbers of events in real time. In this environment, database applications demand both high throughput (at reasonable costs), and pred...
Jerry Baulier, Stephen Blott, Henry F. Korth, Abra...
CAISE
2006
Springer
15 years 5 months ago
An Efficient Implementation of a Rule-based Adaptive Web Information System
Abstract. Mobile devices provide a variety of ways to access information resources available on the Web and a high level of adaptability to different aspects (e.g., device capabili...
Davide Valeriano, Roberto De Virgilio, Riccardo To...