Sciweavers

319 search results - page 34 / 64
» Defining Requirements for an Incident Management System: A C...
Sort
View
DSONLINE
2006
79views more  DSONLINE 2006»
13 years 7 months ago
Integrating Security Policies via Container Portable Interceptors
In the past, it was very common to develop middleware without consideration of security from the very beginning. To integrate security, the middleware that should be protected has...
Tom Ritter, Rudolf Schreiner, Ulrich Lang
ADBIS
2006
Springer
104views Database» more  ADBIS 2006»
14 years 1 months ago
Multi-source Materialized Views Maintenance: Multi-level Views
In many information systems, the databases that make up the system are distributed in different modules or branch offices according to the requirements of the business enterprise. ...
Josep Silva, Jorge Belenguer, Matilde Celma
PDPTA
2004
13 years 9 months ago
Efficient Disk Replacement and Data Migration Algorithms for Large Disk Subsystems
Random data placement has recently emerged as an alternative to traditional data striping. From a performance perspective, it has been demonstrated to be an efficient and scalable...
Roger Zimmermann, Beomjoo Seo
CRITIS
2007
13 years 9 months ago
Ideal Based Cyber Security Technical Metrics for Control Systems
Much of the world's critical infrastructure is at risk from attack through electronic networks connected to control systems. Security metrics are important because they provid...
Wayne F. Boyer, Miles A. McQueen
IADIS
2003
13 years 9 months ago
Automatic Gui Generation in Web Based Information Systems
The HCI subsystem is an essential component of an Information System, whose success inside an organization strongly depend on user acceptance. A good UI design considering usabili...
Nicola Aloia, Cesare Concordia, Maria Teresa Parat...