Sciweavers

227 search results - page 29 / 46
» Towards OLAP Security Design - Survey and Research Issues
Sort
View
IJWIS
2007
153views more  IJWIS 2007»
13 years 7 months ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...
SIGUCCS
2005
ACM
14 years 1 months ago
Imaging, security, configuration, and maintenance for the masses
Educational Partnerships and Learning Technologies (EPLT) [1] at the University of Washington maintains and supports a fleet of approximately 1,000 general-access student computin...
Brandon Koeller, Karalee Woody
TEI
2009
ACM
97views Hardware» more  TEI 2009»
14 years 2 months ago
The other brother: re-experiencing spontaneous moments from domestic life
In this paper, we describe “The Other Brother”, a semiautonomous device that captures images and video of spontaneous moments in the course of everyday life. It was our goal t...
John Helmes, Caroline Hummels, Abigail Sellen
FDTC
2008
Springer
87views Cryptology» more  FDTC 2008»
13 years 9 months ago
Silicon-level Solutions to Counteract Passive and Active Attacks
This article presents a family of cryptographic ASICs, called SecMat, designed in CMOS 130 nanometer technology by the authors with the help of STMicroelectronics. The purpose of ...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...
SACMAT
2011
ACM
12 years 10 months ago
xDAuth: a scalable and lightweight framework for cross domain access control and delegation
Cross domain resource sharing and collaborations have become pervasive in today’s service oriented organizations. Existing approaches for the realization of cross domain access ...
Masoom Alam, Xinwen Zhang, Kamran Khan, Gohar Ali