Sciweavers

260 search results - page 51 / 52
» Semantic model checking security requirements for web servic...
Sort
View
DSN
2002
IEEE
14 years 1 months ago
Generic Timing Fault Tolerance using a Timely Computing Base
Designing applications with timeliness requirements in environments of uncertain synchrony is known to be a difficult problem. In this paper, we follow the perspective of timing ...
Antonio Casimiro, Paulo Veríssimo
FIDJI
2004
Springer
14 years 1 months ago
Task-Based Access Control for Virtual Organizations
Abstract. GOLD (Grid-based Information Models to Support the Rapid Innovation of New High Value-Added Chemicals) is concerned with the dynamic formation and management of virtual o...
Panos Periorellis, Savas Parastatidis
DBSEC
2006
124views Database» more  DBSEC 2006»
13 years 10 months ago
Consolidating the Access Control of Composite Applications and Workflows
The need for enterprise application integration projects leads to complex composite applications. For the sake of security and efficiency, consolidated access control policies for ...
Martin Wimmer, Alfons Kemper, Maarten Rits, Volkma...
DATESO
2010
96views Database» more  DATESO 2010»
13 years 6 months ago
A Framework for Efficient Design, Maintaining, and Evolution of a System of XML Applications
Abstract. The today's applications usually form a system of sub-applications, each being responsible for a particular functionality. Hence, the design and maintenance of such ...
Martin Necaský, Irena Mlýnková...
SIGCSE
2002
ACM
211views Education» more  SIGCSE 2002»
13 years 8 months ago
To java.net and beyond: teaching networking concepts using the Java networking API
This paper covers the use of Java and its API for developing networking programs in an undergraduate computer networks class. Through the use of TCP and UDP sockets provided in th...
Greg Gagne