Sciweavers

5722 search results - page 172 / 1145
» Security Function Interactions
Sort
View
101
Voted
SIGMOD
2011
ACM
204views Database» more  SIGMOD 2011»
14 years 3 months ago
Datalog and emerging applications: an interactive tutorial
We are witnessing an exciting revival of interest in recursive Datalog queries in a variety of emerging application domains such as data integration, information extraction, netwo...
Shan Shan Huang, Todd Jeffrey Green, Boon Thau Loo
105
Voted
BIRTHDAY
2005
Springer
15 years 6 months ago
Towards MultiMedia Instruction in Safe and Secure Systems
Abstract. The aim of the MMiSS project is the construction of a multimedia Internet-based adaptive educational system. Its content will initially cover a whole curriculum in the ar...
Bernd Krieg-Brückner
ONDM
2007
15 years 2 months ago
Securing Passive Optical Networks Against Signal Injection Attacks
Passive optical access networks are susceptible to intended attacks and unintended failures. This paper discusses intrusion by user-side signalinjection resulting in reduced networ...
Harald Rohde, Dominic A. Schupke
117
Voted
IJWIS
2007
153views more  IJWIS 2007»
15 years 18 days ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...
XMLSEC
2003
ACM
15 years 6 months ago
Optimistic fair contract signing for Web services
Reliable and atomic transactions are a key to successful eBusiness interactions. Reliable messaging subsystems, such as IBM’s MQ Series, or broker-based techniques have been tra...
Hiroshi Maruyama, Taiga Nakamura, Tony Hsieh