Sciweavers

74 search results - page 4 / 15
» New Security Architectures Based on Emerging Disk Functional...
Sort
View
TES
2001
Springer
14 years 22 min ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...
SAINT
2006
IEEE
14 years 1 months ago
A Capability-Based Access Control Architecture for Multi-Domain Publish/Subscribe Systems
Publish/subscribe has emerged as an attractive communication paradigm for building Internet-wide distributed systems by decoupling message senders from receivers. So far most of t...
Lauri I. W. Pesonen, David M. Eyers, Jean Bacon
ADBIS
2010
Springer
136views Database» more  ADBIS 2010»
13 years 9 months ago
New Frontiers in Business Intelligence: Distribution and Personalization
Abstract. To meet the new, more sophisticated needs of decision makers, a new generation of BI systems is emerging. In this paper we focus on two enabling technologies for this new...
Stefano Rizzi
SACMAT
2005
ACM
14 years 1 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
SIGOPSE
1998
ACM
13 years 11 months ago
Distributed virtual machines: a system architecture for network computing
Modern virtual machines, such as Java and Inferno, are emerging as network computing s. While these virtual machines provide higher-level abstractions and more sophisticated servi...
Emin Gün Sirer, Robert Grimm, Brian N. Bersha...