Sciweavers

1034 search results - page 139 / 207
» Dynamic Access Control Framework Based On Events
Sort
View
ICC
2009
IEEE
164views Communications» more  ICC 2009»
13 years 5 months ago
Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of...
Khalid Alsubhi, Issam Aib, Jérôme Fra...
ICSOC
2005
Springer
14 years 1 months ago
Trust-Based Secure Workflow Path Construction
—Service-oriented computing promotes collaboration by defining the standards layer that allows compatibility between disparate domains. Workflows, by taking advantage of the serv...
Mine Altunay, Douglas E. Brown, Gregory T. Byrd, R...
MCS
2006
Springer
13 years 8 months ago
Architectural concepts and Design Patterns for behavior modeling and integration
The design of the control software for complex systems is a difficult task. It requires the modeling, the simulation, the integration and the adaptation of a multitude of intercon...
Jean-Marc Perronne, Laurent Thiry, Bernard Thirion
ICISC
2007
105views Cryptology» more  ICISC 2007»
13 years 9 months ago
Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments
Establishing interoperability is the first and foremost problem of secure interoperation in multi-domain environments. In this paper, we propose a framework to facilitate the esta...
Jinwei Hu, Ruixuan Li, Zhengding Lu
WAPCV
2007
Springer
14 years 2 months ago
A Proto-object Based Visual Attention Model
One of the first steps of any visual system is that of locating suitable interest points, ‘salient regions’, in the scene, to detect events, and eventually to direct gaze towa...
Francesco Orabona, Giorgio Metta, Giulio Sandini