Sciweavers

705 search results - page 91 / 141
» Security Policy Coordination for Heterogeneous Information S...
Sort
View
CCS
2007
ACM
15 years 4 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
SIGDOC
2009
ACM
15 years 4 months ago
Formalization and community investment in wikipedia's regulating texts: the role of essays
This poster presents ongoing research on how discursive and editing behaviors are regulated on Wikipedia by means of documented rules and practices. Our analysis focuses on three ...
Jonathan T. Morgan, Katie Derthick, Toni Ferro, El...
COOPIS
1998
IEEE
15 years 2 months ago
A Generative Communication Service for Database Interoperability
Parallel and distributed programming is conceptually harder to undertake and to understand than sequential programming, because a programmer often has to manage the coexistence an...
Wilhelm Hasselbring, Mark Roantree
STORAGESS
2006
ACM
15 years 3 months ago
Long-term threats to secure archives
Archival storage systems are designed for a write-once, read-maybe usage model which places an emphasis on the long-term preservation of their data contents. In contrast to tradit...
Mark W. Storer, Kevin M. Greenan, Ethan L. Miller
ICDE
2002
IEEE
143views Database» more  ICDE 2002»
15 years 11 months ago
Declarative Composition and Peer-to-Peer Provisioning of Dynamic Web Services
The development of new services through the integration of existing ones has gained a considerable momentum as a means to create and streamline business-to-business collaborations...
Boualem Benatallah, Quan Z. Sheng, Anne H. H. Ngu,...