Sciweavers

804 search results - page 38 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
RIDE
2002
IEEE
15 years 9 months ago
Extensible Data Management in the Middle-Tier
Current data management solutions are largely optimized for intra-enterprise, client-server applications. They depend on predictability, predefined structure, and universal admini...
Brian F. Cooper, Neal Sample, Michael J. Franklin,...
IEEEARES
2006
IEEE
15 years 10 months ago
A Declarative Control Language for Dependable XML Message Queues
We present a novel approach for the implementation of efficient and dependable web service engines (WSEs). A WSE instance represents a single node in a distributed network of par...
Alexander Böhm 0002, Carl-Christian Kanne, Gu...
EUROMICRO
2002
IEEE
15 years 9 months ago
Customer Choice in a Multi-Service Residential Access Network Environment
TORRENT is an EU-Supported Framework 5 project that is showing how intelligent control and negotiation capabilities can be built into access networks so as to give the residential...
Eric Scharf, Peter Hamer, Konstantinos Smparounis,...
ICDCSW
2003
IEEE
15 years 9 months ago
Controlled Availability of Pervasive Web Services
The increasing use of computers to manage everyday business poses problems for workers when they are away from their home environment. There are two key problems: • How can a mo...
Peter Robinson, Stefan Hild
CORR
2011
Springer
195views Education» more  CORR 2011»
14 years 11 months ago
Context-aware Authorization in Highly Dynamic Environments
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require frequent adaptation of applications. Context is a key to adapt suiting user ne...
Jean-Yves Tigli, Stephane Lavirotte, Gaëtan R...