Sciweavers

819 search results - page 89 / 164
» Security Controls Applied to Web Service Architectures
Sort
View
SOSP
2007
ACM
15 years 6 months ago
Information flow control for standard OS abstractions
ion Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek Eddie Kohler† Robert Morris MIT CSAIL †UCLA http://flum...
Maxwell N. Krohn, Alexander Yip, Micah Z. Brodsky,...
HOTOS
1997
IEEE
15 years 2 months ago
Security for Extensible Systems
The recent trend towards dynamically extensible systems, such as Java, SPIN or VINO, promises more powerful and flexible systems. At the same time, the impact of extensibility on...
Robert Grimm, Brian N. Bershad
SAC
2008
ACM
14 years 9 months ago
PPEPR: plug and play electronic patient records
The integration of Electronic Patient Record (EPR) systems is at the centre of many of the new regional and national initiatives to integrate clinical processes across department,...
Ratnesh Sahay, Waseem Akhtar, Ronan Fox
WWW
2002
ACM
15 years 10 months ago
A web-based resource migration protocol using WebDAV
The web's hyperlinks are notoriously brittle, and break whenever a resource migrates. One solution to this problem is a transparent resource migration mechanism, which separa...
Michael P. Evans, Steven Furnell
CORR
2006
Springer
100views Education» more  CORR 2006»
14 years 9 months ago
A Combined LIFO-Priority Scheme for Overload Control of E-commerce Web Servers
E-commerce Web-servers often face overload conditions during which revenue-generating requests may be dropped or abandoned due to an increase in the browsing requests. In this pap...
Naresh Singhmar, Vipul Mathur, Varsha Apte, D. Man...