Sciweavers

34 search results - page 6 / 7
» Using online services in untrusted environments: a privacy-p...
Sort
View
COMGEO
2010
ACM
14 years 17 days ago
GIS in the cloud: implementing a web map service on Google App Engine
Many producers of geographic information are now disseminating their data using open web service protocols, notably those published by the Open Geospatial Consortium. There are ma...
J. D. Blower
IADIS
2004
13 years 9 months ago
Preliminary Steps in Designing and Implementing a Privilege Verifier for PMI
We have designed and deployed a system that uses X.509 public-key certificates (PKC) and attribute certificates (AC) for access control. This includes an authorization service for...
Diana Berbecaru, Antonio Lioy
VLDB
1998
ACM
102views Database» more  VLDB 1998»
13 years 12 months ago
A Database System for Real-Time Event Aggregation in Telecommunication
Telecommunication networks process verylarge numbers of events in real time. In this environment, database applications demand both high throughput (at reasonable costs), and pred...
Jerry Baulier, Stephen Blott, Henry F. Korth, Abra...
FLAIRS
2003
13 years 9 months ago
LIDS: Learning Intrusion Detection System
The detection of attacks against computer networks is becoming a harder problem to solve in the field of network security. The dexterity of the attackers, the developing technolog...
Mayukh Dass, James Cannady, Walter D. Potter
GRID
2006
Springer
13 years 7 months ago
Providing Portlet-Based Client Access to CIMA-Enabled Crystallographic Instruments, Sensors, and Data
The Common Instrument Middleware Architecture (CIMA) project, supported by the NSF Middleware Initiative, aims at making scientific instruments and sensors remotely accessible by ...
Hao Yin, Donald F. McMullen, Mehmet A. Nacar, Marl...