Sciweavers

6907 search results - page 222 / 1382
» Securing distributed adaptation
Sort
View
COOPIS
2002
IEEE
15 years 9 months ago
Object Security Attributes: Enabling Application-Specific Access Control in Middleware
This paper makes two main contributions towards establishing support for application-specific factors in middleware security mechanisms. First, it develops a simple classification...
Konstantin Beznosov
130
Voted
ICSM
2002
IEEE
15 years 9 months ago
Maintaining Software with a Security Perspective
Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels....
Kanta Jiwnani, Marvin V. Zelkowitz
COMPSAC
2000
IEEE
15 years 8 months ago
Firewall Security: Policies, Testing and Performance Evaluation
This paper explores the firewall security and performance relationship for distributed systems. Experiments are conducted to set firewall security into seven different levels and ...
Michael R. Lyu, Lorrien K. Y. Lau
ICIP
2003
IEEE
15 years 9 months ago
Texture analysis: an adaptive probabilistic approach
Two main issues arise when working in the area of texture segmentation: the need to describe the texture accurately by capturing its underlying structure, and the need to perform ...
Karen Brady, Ian Jermyn, Josiane Zerubia
158
Voted
PVLDB
2010
114views more  PVLDB 2010»
15 years 2 months ago
Peer coordination through distributed triggers
This is a demonstration of data coordination in a peer data management system through the employment of distributed triggers. The latter express in a declarative manner individual...
Verena Kantere, Maher Manoubi, Iluju Kiringa, Timo...