Sciweavers

192 search results - page 16 / 39
» The Architecture of a Privacy-Aware Access Control Decision ...
Sort
View
HIPEAC
2005
Springer
14 years 2 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee
ICSE
2004
IEEE-ACM
14 years 8 months ago
Extending the Representational State Transfer (REST) Architectural Style for Decentralized Systems
Because it takes time and trust to establish agreement, traditional consensus-based architectural styles cannot safely accommodate resources that change faster than it takes to tr...
Rohit Khare, Richard N. Taylor
ESCIENCE
2006
IEEE
14 years 2 months ago
CIMA Based Remote Instrument and Data Access: An Extension into the Australian e-Science Environment
The Common Instrument Middleware Architecture (CIMA) is being used as a core component of a portal based remote instrument access system being developed as an Australian e-Science...
Ian M. Atkinson, Douglas du Boulay, Clinton Chee, ...
JCP
2006
106views more  JCP 2006»
13 years 8 months ago
Using Firewalls to Enforce Enterprise-wide Policies over Standard Client-Server Interactions
We propose and evaluate a novel framework for enforcing global coordination and control policies over message passing software components in enterprise computing environments. This...
Tuan Phan, Zhijun He, Thu D. Nguyen
RTSS
2009
IEEE
14 years 3 months ago
Rapid Early-Phase Virtual Integration
In complex hard real-time systems with tight constraints on system resources, small changes in one component of a system can cause a cascade of adverse effects on other parts of t...
Sibin Mohan, Min-Young Nam, Rodolfo Pellizzoni, Lu...