Sciweavers

1923 search results - page 114 / 385
» Modeling Complexity in Secure Distributed Computing
Sort
View
VRST
2000
ACM
15 years 2 months ago
DEVA3: architecture for a large-scale distributed virtual reality system
In this paper we present the work undertaken by the Advanced Interfaces Group at the University of Manchester into the design and development of a system to support large numbers ...
Steve Pettifer, Jonathan Cook, James Marsh, Adrian...
WETICE
2005
IEEE
15 years 3 months ago
Trust Infrastructure for Policy based Messaging In Open Environments
Policy-based messaging (PBM) aims at carrying security policies with messages, which will be enforced at recipient systems to provide security features. PBM promotes a distributed...
Gansen Zhao, David W. Chadwick
SACMAT
2004
ACM
15 years 3 months ago
A role-based approach to access control for XML databases
In order to provide a general access control methodology for parts of XML documents, we propose combining rolebased access control as found in the Role Graph Model, with a methodo...
Jingzhu Wang, Sylvia L. Osborn
TSP
2010
14 years 4 months ago
Selection policy-induced reduction mappings for Boolean networks
Developing computational models paves the way to understanding, predicting, and influencing the long-term behavior of genomic regulatory systems. However, several major challenges ...
Ivan Ivanov, Plamen Simeonov, Noushin Ghaffari, Xi...
IAJIT
2010
166views more  IAJIT 2010»
14 years 8 months ago
Specification and Prototyping of Reactive Distributed Systems with Algebraic Term Nets
: The specification of the dynamic behaviour of reactive distributed systems must exhibit the structures of control and has to imply explicitly the relevant aspects of the distribu...
Faiza Bouchoul, Mohamed Mostefai