Sciweavers

172 search results - page 23 / 35
» Role-based security for distributed object systems
Sort
View
EUROPAR
2004
Springer
15 years 3 months ago
Profiling Grid Data Transfer Protocols and Servers
The trend of data intensive grid applications has brought grid storage protocols and servers into focus. The objective of this study is to gain an understanding of how time is spen...
George Kola, Tevfik Kosar, Miron Livny
SCAM
2005
IEEE
15 years 5 months ago
Static Analysis for Computing Escapability and Mutability for Java Components
A common theme in information security is protection of trusted software components against unauthorized access by untrusted users. In the context of distributed object technologi...
Aiwu Shi, Gleb Naumovich
DEON
2008
Springer
15 years 1 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...

Book
688views
16 years 9 months ago
Database Management Systems
A set of presentations covering the book, which includes the following topics ER Model and Conceptual Design, The Relational Model and SQL DDL, Relational Algebra, SQL, Database Ap...
Raghu Ramakrishnan, Johannes Gehrke
JAVA
1999
Springer
15 years 4 months ago
The Gateway System: Uniform Web Based Access to Remote Resources
Exploiting our experience developing the WebFlow system, we designed the Gateway system to provide seamless and secure access to computational resources at ASC MSRC. The Gateway f...
Geoffrey Fox, Tomasz Haupt, Erol Akarsu, Alexey Ka...