Sciweavers

291 search results - page 38 / 59
» Model driven development of secure XML databases
Sort
View
WSC
2008
13 years 10 months ago
Definition and analysis of composition structures for discrete-event models
The re-use of a model by someone else than the original developer is still an open challenge. This paper presents composition structures and interface descriptions for discreteeve...
Mathias Röhl, Adelinde M. Uhrmacher
CNSR
2005
IEEE
112views Communications» more  CNSR 2005»
14 years 1 months ago
Generating Representative Traffic for Intrusion Detection System Benchmarking
In this paper, a modeling and simulation framework is proposed for generating data for training and testing intrusion detection systems. The framework can develop models of web us...
Hilmi Günes Kayacik, A. Nur Zincir-Heywood
ICICS
2007
Springer
13 years 11 months ago
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in ...
Charalampos Papamanthou, Roberto Tamassia
CIIA
2009
13 years 8 months ago
Web Services Composition Applying MDA
Currently, Web services are available on Internet in a simple and easy way to use. However, a single service can not respond to a predetermined request by user. Thus, it is necessa...
Yamina Hachemi, Mimoun Malki, Djamel Amar Bensaber
ICALT
2003
IEEE
14 years 25 days ago
A Conformance Test Suite of Localized LOM Model
Since the approval of IEEE LOM Draft Standard and the advance of network-driven learning technology, a large number of resource database constructors, content developers and learn...
Xin Xiang, Yuanchun Shi, Ling Guo