Sciweavers

626 search results - page 76 / 126
» Analysing Security Requirements of Information Systems Using...
Sort
View
ICMCS
1998
IEEE
154views Multimedia» more  ICMCS 1998»
14 years 18 hour ago
Automatic Image Structure Analysis
The rapid growth of multimedia technology has resulted in an enormous amount of data that needs to be managed and indexed efficiently to provide effective labeling for an image in...
A. W. Wardhani, Ruben Gonzalez
SOSP
2003
ACM
14 years 4 months ago
Decentralized user authentication in a global file system
The challenge for user authentication in a global file system is allowing people to grant access to specific users and groups in remote administrative domains, without assuming ...
Michael Kaminsky, George Savvides, David Mazi&egra...
SACMAT
2003
ACM
14 years 1 months ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
COMPSAC
2005
IEEE
14 years 1 months ago
Considerations on a New Software Architecture for Distributed Environments Using Autonomous Semantic Agents
Distributed processing environments such as that of a traffic management network system (TMS) can be implemented easier, faster, and secure and perform better through use of auton...
Atilla Elçi, Behnam Rahnama
CONCURRENCY
2004
93views more  CONCURRENCY 2004»
13 years 7 months ago
Studying protein folding on the Grid: experiences using CHARMM on NPACI resources under Legion
-- One of the benefits of a computational grid is the ability to run high-performance applications over distributed resources simply and securely. We demonstrated this benefit with...
Anand Natrajan, Michael Crowley, Nancy Wilkins-Die...