Sciweavers

2477 search results - page 391 / 496
» Object list controlled process data system
Sort
View
DBSEC
2004
170views Database» more  DBSEC 2004»
13 years 11 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...
PERCOM
2009
ACM
14 years 5 months ago
Implementation of a MAC Protocol for QoS Support in Wireless Sensor Networks
— Future application areas of wireless sensor networks (WSNs) may include industrial process automation, aircraft control systems or patient monitoring in hospitals. Such applica...
Petcharat Suriyachai, Utz Roedig, Andrew Scott
HICSS
2010
IEEE
216views Biometrics» more  HICSS 2010»
14 years 3 months ago
A Virtualization Architecture for In-Depth Kernel Isolation
Recent advances in virtualization technologies have sparked a renewed interest in the use of kernel and process virtualization as a security mechanism to enforce resource isolatio...
Jiang Wang, Sameer Niphadkar, Angelos Stavrou, Anu...
ADC
2004
Springer
141views Database» more  ADC 2004»
14 years 1 months ago
Conflict Scheduling of Transactions on XML Documents
In the last few years an interest in native XML databases has surfaced. With other authors we argue that such databases need their own provisions for concurrency control since tra...
Stijn Dekeyser, Jan Hidders
ACMICEC
2008
ACM
276views ECommerce» more  ACMICEC 2008»
14 years 6 days ago
A Bayesian network for IT governance performance prediction
The goal of IT governance is not only to achieve internal efficiency in an IT organization, but also to support IT's role as a business enabler. The latter is here denoted IT...
Mårten Simonsson, Robert Lagerström, Po...