Sciweavers

191 search results - page 34 / 39
» Building Intrusion-Tolerant Secure Software
Sort
View
SACMAT
2005
ACM
14 years 1 months ago
Role mining with ORCA
With continuously growing numbers of applications, enterprises face the problem of efficiently managing the assignment of access permissions to their users. On the one hand, secur...
Jürgen Schlegelmilch, Ulrike Steffens
OOPSLA
2004
Springer
14 years 1 months ago
Scalable extensibility via nested inheritance
Inheritance is a useful mechanism for factoring and reusing code. However, it has limitations for building extensible systems. We describe nested inheritance, a mechanism that add...
Nathaniel Nystrom, Stephen Chong, Andrew C. Myers
WMASH
2003
ACM
14 years 1 months ago
Challenge: ubiquitous location-aware computing and the "place lab" initiative
To be widely adopted, location-aware computing must be as effortless, familiar and rewarding as web search tools like Google. We envisage the global scale Place Lab, consisting of...
Bill N. Schilit, Anthony LaMarca, Gaetano Borriell...
CIKM
2003
Springer
14 years 1 months ago
Misuse detection for information retrieval systems
We present a novel approach to detect misuse within an information retrieval system by gathering and maintaining knowledge of the behavior of the user rather than anticipating att...
Rebecca Cathey, Ling Ma, Nazli Goharian, David A. ...
ASE
2005
145views more  ASE 2005»
13 years 7 months ago
Developing Ambient Intelligence Systems: A Solution based on Web Services
Enabling the ambient intelligence vision means that consumers will be provided with universal and immediate access to available content and services, together with ways of effectiv...
Valérie Issarny, Daniele Sacchetti, Ferda T...