Sciweavers

2057 search results - page 103 / 412
» Distributed Secure Systems: Then and Now
Sort
View
WISA
2004
Springer
15 years 9 months ago
Inconsistency Detection of Authorization Policies in Distributed Component Environment
In distributed component environment, a Role-Based Access Control (RBAC) server manages all authorization policies of components in the same domains whereas the components are dist...
Chang-Joo Moon, Hoh Peter In
IDEAS
2002
IEEE
111views Database» more  IDEAS 2002»
15 years 9 months ago
Distributing CORBA views from an OODBMS
The need to distribute objects on the Internet and to offer views from databases has found a solution with the advent of CORBA. Most database management systems now offer CORBA in...
Eric Viara, Guy Vaysseix, Emmanuel Barillot
PVLDB
2010
122views more  PVLDB 2010»
15 years 2 months ago
From a Stream of Relational Queries to Distributed Stream Processing
Applications from several domains are now being written to process live data originating from hardware and softwarebased streaming sources. Many of these applications have been wr...
Qiong Zou, Huayong Wang, Robert Soulé, Mart...
MOBISYS
2008
ACM
16 years 3 months ago
Flashproxy: transparently enabling rich web content via remote execution
It is now common for Web sites to use active Web content, such as Flash, Silverlight, or Java applets, to support rich, interactive applications. For many mobile devices, however,...
Alexander Moshchuk, Steven D. Gribble, Henry M. Le...
130
Voted
BCS
2008
15 years 5 months ago
Distributed Defence Against Denial of Service Attacks: A Practical View
In recent years, Denial of Service attacks have evolved into a predominant network security threat. In our previous work, we identified the necessary building blocks for an effect...
Gülay Öke, Georgios Loukas