Sciweavers

258 search results - page 43 / 52
» Portable secure identity management for software engineering
Sort
View
WWW
2004
ACM
14 years 9 months ago
Edgecomputing: extending enterprise applications to the edge of the internet
Content delivery networks have evolved beyond traditional distributed caching. With services such as Akamai's EdgeComputing it is now possible to deploy and run enterprise bu...
Andy Davis, Jay Parikh, William E. Weihl
COMPSAC
2007
IEEE
14 years 11 days ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie
ISBI
2004
IEEE
14 years 9 months ago
SCIRun/BioPSE: Integrated Problem Solving Environment for Bioelectric Field Problems and Visualization
SCIRun is a general purpose problem solving environment that seeks to integrate the steps of preparing, executing, and visualizing simulations of physical and biological systems. ...
Robert S. MacLeod, David M. Weinstein, J. Davison ...
ICST
2009
IEEE
14 years 3 months ago
Unit Testing Non-functional Concerns of Component-based Distributed Systems
Unit testing component-based distributed systems traditionally involved testing functional concerns of the application logic throughout the development lifecycle. In contrast, tes...
James H. Hill, Hamilton A. Turner, James R. Edmond...
EMSOFT
2005
Springer
14 years 2 months ago
Passive mid-stream monitoring of real-time properties
Passive monitoring or testing of complex systems and networks running in the field can provide valuable insights into their behavior in actual environments of use. In certain con...
Lalita Jategaonkar Jagadeesan, Ramesh Viswanathan