Sciweavers

2335 search results - page 355 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
CCS
2005
ACM
15 years 7 months ago
CPOL: high-performance policy evaluation
Policy enforcement is an integral part of many applications. Policies are often used to control access to sensitive information. Current policy specification languages give users ...
Kevin Borders, Xin Zhao, Atul Prakash
WECWIS
2003
IEEE
125views ECommerce» more  WECWIS 2003»
15 years 7 months ago
A Non-Repudiation Message Transfer Protocol for E-commerce
In the business world, exchange of signatures or receipts is a common practice in case of future dispute. Likewise, it is critical in E-commerce applications to have the security ...
Seokwon Yang, Stanley Y. W. Su, Herman Lam
AGENTS
1999
Springer
15 years 6 months ago
Personal Navigating Agents
The World Wide Web provides a huge distributed web database. However, information in the web database is free formatted and unorganized. Traditional keyword-based retrieval approa...
H. L. Wang, W. K. Shih, C. N. Hsu, Y. S. Chen, Y. ...
BIS
2008
86views Business» more  BIS 2008»
15 years 3 months ago
Specifying Separation of Duty Constraints in BPEL4People Processes
Abstract. Security issues have to be carefully considered for information systems that support the business processes of an organization, in particular, when these systems build on...
Jan Mendling, Karsten Ploesser, Mark Strembeck
CDC
2008
IEEE
217views Control Systems» more  CDC 2008»
15 years 2 months ago
An ensemble Kalman filtering approach to highway traffic estimation using GPS enabled mobile devices
Traffic state estimation is a challenging problem for the transportation community due to the limited deployment of sensing infrastructure. However, recent trends in the mobile pho...
Daniel B. Work, Olli-Pekka Tossavainen, Sebastien ...