Sciweavers

327 search results - page 13 / 66
» Access and Use Control using Externally Controlled Reference...
Sort
View
AIPS
2006
13 years 10 months ago
Run-Time Monitoring of the Execution of Plans for Web Service Composition
While a lot of work has been done on the problem of the automated generation of plans that compose web services, the problem of monitoring their execution has still to be investig...
Fabio Barbon, Paolo Traverso, Marco Pistore, Miche...
IEEEARES
2010
IEEE
14 years 2 months ago
LSM-Based Secure System Monitoring Using Kernel Protection Schemes
—Monitoring a process and its file I/O behaviors is important for security inspection for a data center server against intrusions, malware infection and information leakage. In ...
Takamasa Isohara, Keisuke Takemori, Yutaka Miyake,...
ICDAR
2003
IEEE
14 years 2 months ago
SAGENT: A Novel Technique for Document Modeling for Secure Access and Distribution
A novel strategy for the representation and manipulation of distributed documents, potentially complex and heterogeneous, is presented in this paper. The document under the propos...
Sanaul Hoque, Hossam Selim, Gareth Howells, Michae...
DMIN
2006
124views Data Mining» more  DMIN 2006»
13 years 10 months ago
Use of Multivariate Data Analysis for Lumber Drying Process Monitoring and Fault Detection
Process monitoring refers to the task of detecting abnormal process operations resulting from the shift in the mean and/or the variance of one or more process variables. To success...
Mouloud Amazouz, Radu Pantea
FTDCS
1997
IEEE
14 years 1 months ago
The Saga Security System: A Security Architecture for Open Distributed Systems
In the paper we present an overview of Saga Security System, a security architecture in open distributed systems. An agent in Saga Security System is called a Saga Agent. The auth...
Masakazu Soshi, Mamoru Maekawa