Sciweavers

7741 search results - page 49 / 1549
» Security in Active Networks
Sort
View
HICSS
2006
IEEE
160views Biometrics» more  HICSS 2006»
14 years 3 months ago
Cyber Defense Competitions and Information Security Education: An Active Learning Solution for a Capstone Course
The content of information security curricula spans a wide array of topics. Because of this variety, a program needs to focus on some particular aspect and provide appropriate dep...
Art Conklin
AICCSA
2008
IEEE
254views Hardware» more  AICCSA 2008»
13 years 11 months ago
Integrating software development security activities with agile methodologies
Because of several vulnerabilities in software products and high amount of damage caused by them, software developers are enforced to produce more secure systems. Software grows u...
Hossein Keramati, Seyed-Hassan Mirian-Hosseinabadi
ICISS
2005
Springer
14 years 2 months ago
Event Detection in Multilevel Secure Active Databases
The event-condition-action paradigm (also known as triggers or rules) is a powerful technology. It gives a database “active” capabilities – the ability to react automatically...
Indrakshi Ray, Wei Huang
SBBD
2004
150views Database» more  SBBD 2004»
13 years 10 months ago
Active XML, Security and Access Control
XML and Web services are revolutioning the automatic management of distributed information, somewhat in the same way that HTML, Web browsers and search engines modified human acce...
Serge Abiteboul, Omar Benjelloun, Bogdan Cautis, T...
ETFA
2008
IEEE
14 years 3 months ago
A secure agent platform for active RFID
RFID are used to identify products in factory automation applications; Multi agent systems are a possibility to introduce flexibility into production processes. This article intro...
Albert Treytl, Werner Spenger, Bilal Riaz