Sciweavers

371 search results - page 32 / 75
» Integrative Security Management for Web-Based Enterprise App...
Sort
View
AUTONOMICS
2008
ACM
13 years 9 months ago
Tracking and tracing containers through distributed sensor middleware
In a container transport system, wireless sensor networks (WSNs) can be used for monitoring products while they are being transported. To be commercially interesting, these WSNs m...
Klaas Thoelen, Sam Michiels, Wouter Joosen
SIGOPS
2010
272views more  SIGOPS 2010»
13 years 6 months ago
The Akamai network: a platform for high-performance internet applications
Comprising more than 61,000 servers located across nearly 1,000 networks in 70 countries worldwide, the Akamai platform delivers hundreds of billions of Internet interactions dail...
Erik Nygren, Ramesh K. Sitaraman, Jennifer Sun
INTERACT
2007
13 years 9 months ago
Usability Challenges in Security and Privacy Policy-Authoring Interfaces
Abstract. Policies, sets of rules that govern permission to access resources, have long been used in computer security and online privacy management; however, the usability of auth...
Robert W. Reeder, Clare-Marie Karat, John Karat, C...
CAISE
2008
Springer
13 years 9 months ago
Improving Data Independence, Efficiency and Functional Flexibility of Integration Platforms
The concept of Enterprise Application Integration (EAI) is widely used for integrating heterogeneous applications and systems by message-based communication. Typically, EAI servers...
Matthias Böhm, Jürgen Bittner, Dirk Habi...
TVLSI
2010
13 years 2 months ago
Architectural Enhancement and System Software Support for Program Code Integrity Monitoring in Application-Specific Instruction-
Program code in a computer system can be altered either by malicious security attacks or by various faults in microprocessors. At the instruction level, all code modifications are ...
Hai Lin, Yunsi Fei, Xuan Guan, Zhijie Jerry Shi