Sciweavers

327 search results - page 10 / 66
» Access and Use Control using Externally Controlled Reference...
Sort
View
ASIAN
2007
Springer
129views Algorithms» more  ASIAN 2007»
13 years 11 months ago
An Integrated Model for Access Control and Information Flow Requirements
Current information systems are more and more complex. They require more interactions between different components and users. So, ensuring system security must not be limited to us...
Samiha Ayed, Nora Cuppens-Boulahia, Fréd&ea...
DEXAW
2004
IEEE
109views Database» more  DEXAW 2004»
13 years 11 months ago
A Deliberative Model for Self-Adaptation Middleware Using Architectural Dependency
: A crucial prerequisite to externalized adaptation is an understanding of how components are interconnected, or more particularly how and why they depend on one another. Such depe...
N. Badr, A. Taleb-Bendiab, Martin Randles, D. Reil...
IEEEARES
2010
IEEE
14 years 2 months ago
External Insider Threat: A Real Security Challenge in Enterprise Value Webs
—Increasingly, organizations collaborate with other organizations in value webs with various arrangements, such as outsourcing, partnering, joint ventures, or subcontracting. As ...
Virginia N. L. Franqueira, André van Cleeff...
DOA
2001
94views more  DOA 2001»
13 years 9 months ago
How to Monitor and Control Resource Usage in Mobile Agent Systems
The Mobile Agent technology has already shown its advantages, but at the same time has already remarked new problems currently limiting its diffusion in commercial environments. A...
Paolo Bellavista, Antonio Corradi, Cesare Stefanel...
ICARCV
2006
IEEE
230views Robotics» more  ICARCV 2006»
14 years 1 months ago
A Biometric Approach to Linux Login Access Control
— Login access control refers to securing the entry point to a computing system. The login system is responsible for this service and must provide a number of tasks, the main tas...
Adam J. Gandossi, Wanquan Liu, Ronny Tjahyadi