Sciweavers

2403 search results - page 315 / 481
» Cyberinsurance in IT Security Management
Sort
View
OOPSLA
2007
Springer
14 years 2 months ago
The JikesXen Java server platform
ose of the JVM is to abstract the Java language from the hardware and software platforms it runs on. For this reason, the JVM uses services offered by the host operating system in...
Georgios Gousios
ICNS
2006
IEEE
14 years 2 months ago
Building Distributed Access Control System Using Service-Oriented Programming Model
– Service-Oriented Programming Model is a new methodology for building service-oriented applications. In the Service-Oriented Programming Model, an application is assembled from ...
Ivan Zuzak, Sinisa Srbljic, Ivan Benc
IEEECIT
2006
IEEE
14 years 2 months ago
Multi-Agent based Data Integration in Real-world
This paper presents a Multi-Agent based Data Integration (MADI) framework for integrating distributed data source across Internet. This framework takes control on high-availabilit...
Yintang Dai, Shiyong Zhang
IWIA
2006
IEEE
14 years 2 months ago
High Robustness Requirements in a Common Criteria Protection Profile
The development of a Common Criteria protection profile for high-robustness separation kernels requires explicit modifications of several Common Criteria requirements as well as e...
Thuy D. Nguyen, Timothy E. Levin, Cynthia E. Irvin...
SKG
2006
IEEE
14 years 2 months ago
Top Ten Questions To Design A Successful Grid Portal
With the enhancement of Grid application, Grid portal provides a unique interface for end-users to access distributed resources and are used widely in Knowledge Grid, e-Science, e...
Xiao Dong Wang, Xiaobo Yang, Rob Allan