Sciweavers

5189 search results - page 966 / 1038
» Modeling architectural patterns using architectural primitiv...
Sort
View
DASFAA
2010
IEEE
176views Database» more  DASFAA 2010»
13 years 9 months ago
Efficient Database-Driven Evaluation of Security Clearance for Federated Access Control of Dynamic XML Documents
Achieving data security over cooperating web services is becoming a reality, but existing XML access control architectures do not consider this federated service computing. In this...
Erwin Leonardi, Sourav S. Bhowmick, Mizuho Iwaihar...
FUIN
2006
66views more  FUIN 2006»
13 years 8 months ago
Observation of String-Rewriting Systems
In most models of computation, a device performs some type of process, and only some final output is regarded as the result. In adding an observer to such a device, one can obtain ...
Matteo Cavaliere, Peter Leupold
PERCOM
2008
ACM
13 years 8 months ago
CASD: Management of a context-aware service directory
Traditional web service discovery is strongly related to the use of service directories. Especially in the case of mobile web services, where both service requestors and providers...
Christos Doulkeridis, Michalis Vazirgiannis
RTS
2006
115views more  RTS 2006»
13 years 8 months ago
Resource access control for dynamic priority distributed real-time systems
Many of today's complex computer applications are being modeled and constructed using the principles inherent to real-time distributed object systems. In response to this dem...
Chen Zhang, David Cordes
JTAER
2007
78views more  JTAER 2007»
13 years 8 months ago
A System for Locating Mobile Terminals with Tunable Privacy
A number of approaches for capturing and processing location information of mobile users have been proposed in the past; however, only with the latest advances in the handset tech...
Sandford Bessler