Sciweavers

744 search results - page 117 / 149
» The Traust Authorization Service
Sort
View
VLDB
1998
ACM
102views Database» more  VLDB 1998»
15 years 2 months ago
A Database System for Real-Time Event Aggregation in Telecommunication
Telecommunication networks process verylarge numbers of events in real time. In this environment, database applications demand both high throughput (at reasonable costs), and pred...
Jerry Baulier, Stephen Blott, Henry F. Korth, Abra...
ECOOPW
1998
Springer
15 years 1 months ago
Role-Based Protection and Delegation for Mobile Object Environments
PrincipalDomain is an administrative scoping construct for establishing security policies based on the principals invoking object services that may entail objects moving around a ...
Nataraj Nagaratnam, Doug Lea
ATAL
2007
Springer
15 years 1 months ago
Towards valuation-aware agent-based traffic control
Traffic authorities work hard to improve resource utilization in traffic. But these efforts do not consider that the valuations of waiting time can be different for each driver, e...
Heiko Schepperle, Klemens Böhm, Simone Forste...
BPM
2007
Springer
258views Business» more  BPM 2007»
15 years 1 months ago
Access Control Requirements for Processing Electronic Health Records
There is currently a strong focus worldwide on the potential of large-scale Electronic Health Record systems to cut costs and improve patient outcomes through increased efficiency....
Bandar Alhaqbani, Colin J. Fidge
CEAS
2007
Springer
15 years 1 months ago
Blog Spam: A Review
Blogs are becoming an increasingly popular target for spammers. The existence of multiple vectors for spam injection, the potential of reaching many eyeballs with a single spam, a...
Adam Thomason