Sciweavers

3086 search results - page 463 / 618
» Developing Secure Web Applications
Sort
View
ESAW
2003
Springer
14 years 2 months ago
Patterns Reuse in the PASSI Methodology
Abstract. Design patterns already proved successful in lowering the development time and number of errors of object-oriented software; now, they are, candidate to play a similar ro...
Massimo Cossentino, Luca Sabatucci, Antonio Chella
CCGRID
2006
IEEE
14 years 1 months ago
Building Cyberinfrastructure for Bioinformatics Using Service Oriented Architecture
-- Cyberinfrastructure makes the development and deployment of bioinformatics applications easier by providing the framework and components that may be loosely coupled using servic...
Wilfred W. Li, Sriram Krishnan, Kurt Mueller, Kohe...
LDTA
2010
13 years 9 months ago
Embedding a web-based workflow management system in a functional language
Workflow management systems guide and monitor tasks performed by humans and computers. The workflow specifications are usually expressed in special purpose (graphical) formalisms....
Jan Martin Jansen, Rinus Plasmeijer, Pieter W. M. ...
IMC
2006
ACM
14 years 3 months ago
Unexpected means of protocol inference
Network managers are inevitably called upon to associate network traffic with particular applications. Indeed, this operation is critical for a wide range of management functions...
Justin Ma, Kirill Levchenko, Christian Kreibich, S...
SIGMOD
1999
ACM
99views Database» more  SIGMOD 1999»
14 years 1 months ago
Belief Reasoning in MLS Deductive Databases
It is envisaged that the application of the multilevel security (MLS) scheme will enhance exibility and e ectiveness of authorization policies in shared enterprise databases and w...
Hasan M. Jamil