Sciweavers

393 search results - page 69 / 79
» Implementing Role Based Access Control for Federated Informa...
Sort
View
MODELLIERUNG
2008
13 years 8 months ago
Modelling Security Goals in Business Processes
: Various types of security goals, such as authentication or confidentiality, can be defined as policies for process-aware information systems, typically in a manual fashion. There...
Christian Wolter, Michael Menzel, Christoph Meinel
SIGUCCS
2000
ACM
13 years 11 months ago
Remedial Help Desk 101 at Florida State University
The User Services division of the Office of Technology Integration is the "safety net" for computer support at Florida State University (FSU). Areas of support include t...
Diana Orrick, Jeff Bauer, Ernest McDuffie
SAC
2009
ACM
14 years 2 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
EUROSYS
2007
ACM
14 years 4 months ago
Competitive prefetching for concurrent sequential I/O
During concurrent I/O workloads, sequential access to one I/O stream can be interrupted by accesses to other streams in the system. Frequent switching between multiple sequential ...
Chuanpeng Li, Kai Shen, Athanasios E. Papathanasio...
DATE
2005
IEEE
133views Hardware» more  DATE 2005»
14 years 1 months ago
Locality-Aware Process Scheduling for Embedded MPSoCs
Utilizing on-chip caches in embedded multiprocessorsystem-on-a-chip (MPSoC) based systems is critical from both performance and power perspectives. While most of the prior work th...
Mahmut T. Kandemir, Guilin Chen