Sciweavers

2429 search results - page 228 / 486
» Using Aspects to Design a Secure System
Sort
View
139
Voted
IADIS
2003
15 years 5 months ago
Integrating RBAC Mechanisms in a Web Server
Hypermedia systems (whether web sites or not) should support multilevel policiesm, offering different views and manipulation abilities of the same information to users with differ...
Daniel Sanz-García, Paloma Díaz, Ign...
139
Voted
HICSS
2006
IEEE
261views Biometrics» more  HICSS 2006»
15 years 9 months ago
e-Risk Management with Insurance: A Framework Using Copula Aided Bayesian Belief Networks
: e-business organizations are heavily dependent on distributed 24X7 robust information computing systems, for their daily operations. To secure distributed online transactions, th...
Arunabha Mukhopadhyay, Samir Chatterjee, Debashis ...
ICCCN
2008
IEEE
15 years 10 months ago
Massively Parallel Anomaly Detection in Online Network Measurement
—Detecting anomalies during the operation of a network is an important aspect of network management and security. Recent development of high-performance embedded processing syste...
Shashank Shanbhag, Tilman Wolf
DAC
2005
ACM
16 years 4 months ago
Efficient fingerprint-based user authentication for embedded systems
User authentication, which refers to the process of verifying the identity of a user, is becoming an important security requirement in various embedded systems. While conventional...
Pallav Gupta, Srivaths Ravi, Anand Raghunathan, Ni...
139
Voted
BCSHCI
2007
15 years 5 months ago
Evaluating advanced interaction techniques for navigating Google Earth
This paper presents the design and comparison of a mousebased interaction technique (hereafter IT) and two advanced IT, used in public spaces to support navigation in a 3D space. ...
Emmanuel Dubois, Philippe Truillet, Cédric ...