Sciweavers

2560 search results - page 26 / 512
» Securing VO Management
Sort
View
SIGMOD
2007
ACM
135views Database» more  SIGMOD 2007»
14 years 11 months ago
XTream: personal data streams
The real usability of data stream systems depends on the practical aspect of building applications on data streams. In this demo we show two possible applications on data streams,...
Michael Duller, Rokas Tamosevicius, Gustavo Alonso...
CHIMIT
2008
ACM
14 years 22 days ago
Guidelines for designing IT security management tools
An important factor that impacts the effectiveness of security systems within an organization is the usability of security management tools. In this paper, we present a survey of ...
Pooya Jaferian, David Botta, Fahimeh Raja, Kirstie...
CSFW
2008
IEEE
14 years 5 months ago
A Trust Management Approach for Flexible Policy Management in Security-Typed Languages
Early work on security-typed languages required that legal information flows be defined statically. More recently, techniques have been introduced that relax these assumptions a...
Sruthi Bandhakavi, William H. Winsborough, Mariann...
AGILEDC
2007
IEEE
14 years 5 months ago
Agile Program Management: Lessons Learned from the VeriSign Managed Security Services Team
This report examines how the VeriSign Managed Security Services team (MSS) has successfully extended agile software development practices to deal with a complex, multi-product dev...
Peter Hodgkins, Luke Hohmann
CORR
2008
Springer
119views Education» more  CORR 2008»
13 years 9 months ago
Unified storage systems for distributed Tier-2 centres
The start of data taking at the Large Hadron Collider will herald a new era in data volumes and distributed processing in particle physics. Data volumes of hundreds of Terabytes wi...
Greig A. Cowan, Graeme A. Stewart, Andrew Elwell