Sciweavers

1353 search results - page 131 / 271
» Securing Current and Future Process Control Systems
Sort
View
155
Voted
ISSRE
2010
IEEE
15 years 2 months ago
Automata-Based Verification of Security Requirements of Composite Web Services
— With the increasing reliance of complex real-world applications on composite web services assembled from independently developed component services, there is a growing need for...
Hongyu Sun, Samik Basu, Vasant Honavar, Robyn R. L...
96
Voted
HICSS
2006
IEEE
122views Biometrics» more  HICSS 2006»
15 years 9 months ago
Reorganizing Government: Bhutan Visa Online
Centralized government document infrastructure and a policy commitment to transform the tourism sector to a more vivid and efficient business sector works as drivers for implement...
Kim Viborg Andersen, Helle Zinner Henriksen
ASPLOS
2006
ACM
15 years 9 months ago
Improving software security via runtime instruction-level taint checking
Current taint checking architectures monitor tainted data usage mainly with control transfer instructions. An alarm is raised once the program counter becomes tainted. However, su...
Jingfei Kong, Cliff Changchun Zou, Huiyang Zhou
123
Voted
WSC
1996
15 years 4 months ago
Controlling Activities in a Virtual Manufacturing Cell
Researchers at the National Institute of Standards and Technology are developing a virtual manufacturing cell. This cell will contain simulation models of a wide range of manufact...
Michael Iuliano, Albert Jones
171
Voted
ICSOC
2004
Springer
15 years 9 months ago
An OGSA-based accounting system for allocation enforcement across HPC centers
In this paper, we present an Open Grid Services Architecture (OGSA)-based decentralized allocation enforcement system, developed with an emphasis on a consistent data model and ea...
Thomas Sandholm, Peter Gardfjäll, Erik Elmrot...