Sciweavers

427 search results - page 56 / 86
» Implementing Real-Time Update of Access Control Policies
Sort
View
CORR
2010
Springer
147views Education» more  CORR 2010»
13 years 4 months ago
RAFDA: A Policy-Aware Middleware Supporting the Flexible Separation of Application Logic from Distribution
Middleware technologies often limit the way in which object classes may be used in distributed applications due to the fixed distribution policies that they impose. These policies...
Scott M. Walker, Alan Dearle, Stuart J. Norcross, ...
ICIW
2009
IEEE
14 years 2 months ago
An Adaptive Scheduling Policy for Staged Applications
The performance of Web servers and application servers is a crucial factor for the success of the underlying business activity. Current commercial servers (such as Apache and Micr...
Mohammad Shadi Al Hakeem, Jan Richling, Gero M&uum...
ITCC
2005
IEEE
14 years 1 months ago
Event-Based Blackboard Architecture for Multi-Agent Systems
Developing large multi-agent systems is a complex task involving the processes of the requirement, architecture, design and implementation of these systems. In particular, the arc...
Jing Dong, Shanguo Chen, Jun-Jang Jeng
ACL
2010
13 years 5 months ago
Demonstration of a Prototype for a Conversational Companion for Reminiscing about Images
This paper describes an initial prototype demonstrator of a Companion, designed as a platform for novel approaches to the following: 1) The use of Information Extraction (IE) tech...
Yorick Wilks, Roberta Catizone, Alexiei Dingli, We...
ACSAC
2009
IEEE
14 years 2 months ago
How to Securely Break into RBAC: The BTG-RBAC Model
—Access control models describe frameworks that dictate how subjects (e.g. users) access resources. In the Role-Based Access Control (RBAC) model access to resources is based on ...
Ana Ferreira, David W. Chadwick, Pedro Farinha, Ri...