Sciweavers

18697 search results - page 188 / 3740
» Systemic Security Management
Sort
View
CCS
2001
ACM
15 years 8 months ago
A Chinese wall security model for decentralized workflow systems
Keywords
Vijayalakshmi Atluri, Soon Ae Chun, Pietro Mazzole...
CCGRID
2006
IEEE
15 years 11 months ago
Closing Cluster Attack Windows Through Server Redundancy and Rotations
— It is well-understood that increasing redundancy in a system generally improves the availability and dependability of the system. In server clusters, one important form of redu...
Yih Huang, David Arsenault, Arun Sood
SACMAT
2010
ACM
15 years 10 months ago
An access control model for mobile physical objects
Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects’ trajectories. Existing access control models ca...
Florian Kerschbaum
GCC
2004
Springer
15 years 10 months ago
XML Based X.509 Authorization in CERNET Grid
: This paper presents an authorization solution for resource management and control developing as a part of the China Education and Research Network (CERNET) to perform fine-graine...
Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li, Ping R...
OOPSLA
2004
Springer
15 years 10 months ago
Empirical investigation of the impact of extreme programming practices on software projects
Extreme Programming (XP) is an agile software development methodology composed of several practices that purportedly yield high quality and high customer satisfaction. However, th...
Lucas Layman