Sciweavers

89 search results - page 10 / 18
» The Efficient Maintenance of Access Roles with Role Hiding
Sort
View
SOFTVIS
2005
ACM
14 years 1 months ago
CVSscan: visualization of code evolution
During the life cycle of a software system, the source code is changed many times. We study how developers can be enabled to get insight in these changes, in order to understand t...
Lucian Voinea, Alexandru Telea, Jarke J. van Wijk
CDC
2010
IEEE
161views Control Systems» more  CDC 2010»
13 years 2 months ago
A geometric approach to air traffic complexity evaluation for strategic trajectory management
In the perspective next generation Air Traffic Management (ATM) systems, aircraft will be endowed with part of the responsibility for separation maintenance, and traffic complexity...
Luigi Piroddi, Maria Prandini
ICDIM
2007
IEEE
14 years 2 months ago
Context-aware security service in RFID/USN environments using MAUT and extended GRBAC
: This paper proposes a context-aware security service providing multiple authentications and authorization from a Security Level which is decided dynamically in a context-aware en...
Kiyeal Lee, Seokhwan Yang, Sungik Jun, Mokdong Chu...
IMECS
2007
13 years 9 months ago
Multi-Application Authentication Based on Multi-Agent System
— This paper proposes an authentication approach to support multi-clients in using a multi-application based environment. The approach is primarily based on the public key infras...
Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Jun...
ICWS
2003
IEEE
13 years 9 months ago
Web Services Communication within the PROGRESS Grid-Portal Environment
The grid is the next generation computing infrastructure able to handle the growing requirements for computing power. Portals are anticipated as the user’s access point to these...
Piotr Grzybowski, Michal Kosiedowski, Cezary Mazur...