Sciweavers

1291 search results - page 73 / 259
» Intrusion Detection for Distributed Applications
Sort
View
VLDB
2004
ACM
100views Database» more  VLDB 2004»
14 years 3 months ago
Resilient Rights Protection for Sensor Streams
Today’s world of increasingly dynamic computing environments naturally results in more and more data being available as fast streams. Applications such as stock market analysis,...
Radu Sion, Mikhail J. Atallah, Sunil Prabhakar
HPCC
2007
Springer
14 years 3 months ago
Continuous Adaptive Outlier Detection on Distributed Data Streams
In many applications, stream data are too voluminous to be collected in a central fashion and often transmitted on a distributed network. In this paper, we focus on the outlier det...
Liang Su, Weihong Han, Shuqiang Yang, Peng Zou, Ya...
WISA
2004
Springer
14 years 3 months ago
Inconsistency Detection of Authorization Policies in Distributed Component Environment
In distributed component environment, a Role-Based Access Control (RBAC) server manages all authorization policies of components in the same domains whereas the components are dist...
Chang-Joo Moon, Hoh Peter In
ERSHOV
1993
Springer
14 years 1 months ago
Formal Derivation of an Error-Detecting Distributed Data Scheduler Using Changeling
Distributed database applications are a wide use of distributed systems. One of the major advantages of distributed database systems is the potential for achieving high availabili...
Hanan Lutfiyya, Bruce M. McMillin, Alan Su 0002
DSOM
2006
Springer
14 years 1 months ago
Detecting Bottleneck in n-Tier IT Applications Through Analysis
As the complexity of large-scale enterprise applications increases, providing performance verification through staging becomes an important part of reducing business risks associat...
Gueyoung Jung, Galen S. Swint, Jason Parekh, Calto...