Sciweavers

243 search results - page 26 / 49
» Secure mobile agent systems using Java: where are we heading
Sort
View
110
Voted
ISSTA
2006
ACM
15 years 9 months ago
Role-Based access control consistency validation
Modern enterprise systems support Role-Based Access Control (RBAC). Although RBAC allows restricting access to privileged operations, a deployer may actually intend to restrict ac...
Paolina Centonze, Gleb Naumovich, Stephen J. Fink,...
126
Voted
RIDE
1999
IEEE
15 years 7 months ago
Establishing Virtual Enterprises by Means of Mobile Agents
Electronic Commerce is expanding from the simple notion of Electronic Store to the notion of Virtual Enterprises (VE) where existing enterprises dynamically form temporary allianc...
Panos K. Chrysanthis, Sujata Banerjee, Shi-Kuo Cha...
DBSEC
2000
110views Database» more  DBSEC 2000»
15 years 4 months ago
Role-Based Security in a Distributed Resource Environment
There are many technologies for distributed processing/interoperation, including CORBA, DCE, DCOM, Enterprise Java Beans, Java IDL, JDBC, etc. Most promising, is the emergence of ...
Steven A. Demurjian, T. C. Ting, J. Balthazar, H. ...
108
Voted
WMCSA
2008
IEEE
15 years 9 months ago
Making CAPTCHAs clickable
We show how to convert regular keyboard-entry CAPTCHAs into clickable CAPTCHAs. The goal of this conversion is to simplify and speed-up the entry of the CAPTCHA solution, to minim...
Richard Chow, Philippe Golle, Markus Jakobsson, Lu...
ICDCS
1998
IEEE
15 years 7 months ago
Structuring Remote Object Systems for Mobile Hosts with Intermittent Connectivity
In distributed object systems, remote method inattempts to abstract communication between di erent machines to the level of object method invocation. Link failure in such systems ...
Girish Welling, Maximilian Ott