-
2
-
-
33751025879
-
Building dependable semantic webs
-
San Diego, CA.
-
B. Thuraisingham, et al, Building Dependable Semantic Webs, Proceedings WORDS 2002, San Diego, CA.
-
Proceedings WORDS 2002
-
-
Thuraisingham, B.1
-
3
-
-
33751039706
-
Real-time dependable data management and mining
-
Proceedings, Seattle WA
-
B. Thuraisingham, et al, Real-time Dependable Data Management and Mining, Proceedings, WORDS 2005, Seattle WA.
-
WORDS 2005
-
-
Thuraisingham, B.1
-
4
-
-
0031198431
-
Object structures for real-time systems and simulators
-
August
-
Kim, K.H., "Object Structures for Real-Time Systems and Simulators", IEEE Computer, August 1997, pp.62-70.
-
(1997)
IEEE Computer
, pp. 62-70
-
-
Kim, K.H.1
-
5
-
-
0033729473
-
APIs for real-time distributed object programming
-
June
-
Kim, K.H., "APIs for Real-Time Distributed Object Programming", IEEE Computer, June 2000, pp.72-80.
-
(2000)
IEEE Computer
, pp. 72-80
-
-
Kim, K.H.1
-
6
-
-
78649435143
-
Object-oriented real-time distributed programming and support middleware
-
Iwate, Japan, July, pub. by IEEE CS Press
-
Kim, K.H., "Object-Oriented Real-Time Distributed Programming and Support Middleware", Proc. ICPADS 2000 (7th Int'l Conf. on Parallel & Distributed Systems), Iwate, Japan, July 2000, pub. by IEEE CS Press
-
(2000)
Proc. ICPADS 2000 (7th Int'l Conf. on Parallel & Distributed Systems)
-
-
Kim, K.H.1
-
7
-
-
33751043576
-
TMO-based object group model for distributed real-time services
-
Tsukuba, Japan, 10.2-4
-
"TMO-Based Object Group Model for Distributed Real-Time Services", Proceedings of IASTED International Conference-Networks, Parallel and Distributed Processing, and Applications (NPDPA 2002), Tsukuba, Japan, 2002.10.2-4.
-
(2002)
Proceedings of IASTED International Conference-Networks, Parallel and Distributed Processing, and Applications (NPDPA 2002)
-
-
-
8
-
-
0028513932
-
Access control: Principle and practice
-
IEEE, Sept.
-
R.S.Sandhu, Samarati, P., "Access control: principle and practice" Communications Magazine, IEEE, Volume: 32, Issue: 9, Sept. 1994 Pages: 40-48
-
(1994)
Communications Magazine
, vol.32
, Issue.9
, pp. 40-48
-
-
Sandhu, R.S.1
Samarati, P.2
-
9
-
-
0030086382
-
Role-based access control models
-
Feb
-
R.S.Sandhu, E.J.Coyne, H.L.Feinstein and C.E. Youman, "Role-Based Access Control Models", IEEE Computer, Volume: 29, Issue: 2, Feb 1996
-
(1996)
IEEE Computer
, vol.29
, Issue.2
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
10
-
-
3142523603
-
The UCONABC usage control model
-
February
-
Jaehong Park, Ravi Sandhu., "The UCONABC usage control model", ACM Transactions on Information and System Security (TISSEC), Volume 7, No 1, February 2004
-
(2004)
ACM Transactions on Information and System Security (TISSEC)
, vol.7
, Issue.1
-
-
Park, J.1
Sandhu, R.2
-
11
-
-
84860017716
-
-
NIST RBAC, http://csrc.nist.gov/rbac
-
-
-
-
13
-
-
33746093610
-
-
OMG CORBA Object Services Specification Chapter 15, March
-
OMG CORBA Object Services Specification Chapter 15: Security Service Specification: v1.8, March 2002
-
(2002)
Security Service Specification: V1.8
-
-
-
14
-
-
0036793924
-
Denial of service in sensor networks
-
Oct.
-
A. Wood and J. Stankovic, "Denial of service in sensor networks," IEEE Computer, vol. 35, pp. 54-62, Oct. 2002.
-
(2002)
IEEE Computer
, vol.35
, pp. 54-62
-
-
Wood, A.1
Stankovic, J.2
|