Sciweavers

704 search results - page 82 / 141
» Resource Access Control for an Internet User Agent
Sort
View
ACSAC
1998
IEEE
15 years 2 months ago
Application-Level Isolation to Cope with Malicious Database Users
System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasors. Intrusion detection techniques are therefore us...
Sushil Jajodia, Peng Liu, Catherine D. McCollum
PERCOM
2005
ACM
15 years 9 months ago
Unleashing the Power of Wearable Devices in a SIP Infrastructure
The Session Initiation Protocol (SIP) has been widely adopted for Instant Messaging (IM) and VoIP telephony both by the enterprise and in service provider systems. Till now, SIP f...
Arup Acharya, Stefan Berger, Chandrasekhar Narayan...
SIGMOD
2003
ACM
179views Database» more  SIGMOD 2003»
15 years 3 months ago
Data Grid Management Systems
: The “Grid” is an emerging infrastructure for coordinating access across autonomous organizations to distributed, heterogeneous computation and data resources. Data grids are ...
Arun Jagatheesan, Arcot Rajasekar
IADIS
2004
14 years 11 months ago
Enhancing educational metadata with digital rights information: the EMDIR web-based environment
Taking into account the constantly increasing number of educational resources available on the Web, the problem arising is to determine who is authorized to access these resources...
Symeon Chatzinotas, Pythagoras Karampiperis, Demet...
TJS
2002
128views more  TJS 2002»
14 years 9 months ago
Packet Spacing: An Enabling Mechanism for Delivering Multimedia Content in Computational Grids
Streaming multimedia with UDP has become increasingly popular over distributed systems like the Internet. Scientific applications that stream multimedia include remote computation...
Annette C. Feng, Apu Kapadia, Wu-chun Feng, Geneva...