Sciweavers

1748 search results - page 290 / 350
» Using Aspect Programming to Secure Web Applications
Sort
View
DGO
2007
150views Education» more  DGO 2007»
15 years 3 months ago
Event-triggered data and knowledge sharing among collaborating government organizations
Solving complex global problems such as illegal immigration, border control, and terrorism requires government organizations at all levels to share not only data but, more importa...
Seema Degwekar, Jeff DePree, Howard W. Beck, Carla...
ECOOP
2009
Springer
16 years 2 months ago
Fine-Grained Access Control with Object-Sensitive Roles
Role-based access control (RBAC) is a common paradigm to ensure that users have sufficient rights to perform various system operations. In many cases though, traditional RBAC does ...
Jeffrey Fischer, Daniel Marino, Rupak Majumdar, To...
SASN
2006
ACM
15 years 7 months ago
Autonomous and distributed node recovery in wireless sensor networks
Intrusion or misbehaviour detection systems are an important and widely accepted security tool in computer and wireless sensor networks. Their aim is to detect misbehaving or faul...
Mario Strasser, Harald Vogt
IRI
2008
IEEE
15 years 8 months ago
Towards an integrated modeling and simulation framework for freight transportation in metropolitan areas
Freight transportation at distribution nodes such as marine ports, airports and rail yards has been putting tremendous environmental pressure in metropolitan areas. A prerequisite...
Qunzhi Zhou, Amol Bakshi, Viktor K. Prasanna, Rama...
118
Voted
CDVE
2007
Springer
136views Visualization» more  CDVE 2007»
15 years 8 months ago
Cooperative Validation in Distributed Control Systems Design
The team of engineers designing and implementing distributed control system software must communicate within a multidisciplinary environment. One of the main problems is the intera...
Dariusz Choinski, Mieczyslaw Metzger, Witold Nocon...