-
1
-
-
58149191926
-
A conceptual formal framework for developing and maintaining security-critical systems
-
30 December
-
H. Abie and A. Skomedal. A conceptual formal framework for developing and maintaining security-critical systems. IJCSNS International Journal of Computer Science and Network Security, 5(12):89-98, 30 December, 2005.
-
(2005)
IJCSNS International Journal of Computer Science and Network Security
, vol.5
, Issue.12
, pp. 89-98
-
-
Abie, H.1
Skomedal, A.2
-
2
-
-
35048873754
-
Rights-carrying and self-enforcing information objects for information distribution systems
-
Lecture notes in computer science, Information And Communications Security: 6th International Conference, ICICS 2004, Malaga, Spain, 27-29 October
-
H. Abie, P. Spilling, and B. Foyn. Rights-carrying and self-enforcing information objects for information distribution systems. Lecture notes in computer science, Information And Communications Security: 6th International Conference, ICICS 2004, Malaga, Spain, LNCS 3269(0302-9743):546-561, 27-29 October, 2004.
-
(2004)
LNCS
, vol.3269
, Issue.302-9743
, pp. 546-561
-
-
Abie, H.1
Spilling, P.2
Foyn, B.3
-
5
-
-
58149201620
-
-
ESB
-
ESB. Enterprise Service Bus (ESB). http://www.sonicsoftware.eom/psm/ enterprise-service-bus/index.ssp.
-
Enterprise Service Bus (ESB)
-
-
-
7
-
-
33750943733
-
-
phd thesis, Virginia polytechnic institute and state university, blacksburg, Virginia, November
-
C. T. R. Hager. Context aware and adaptive security for wireless networks, phd thesis, Virginia polytechnic institute and state university, blacksburg, Virginia, November, 2004.
-
(2004)
Context aware and adaptive security for wireless networks
-
-
Hager, C.T.R.1
-
8
-
-
58149192206
-
MQ support for web services and HTTPR
-
April, 2002
-
IBM. IBM WebSphere MQ support for web services and HTTPR. MA0R support pac, April, 2002. http://www-3.ibm.com/software/ts/mqseries/txppacs/ma0r.html.
-
MA0R support pac
-
-
-
10
-
-
33845251872
-
Towards a managed extensible control plane for knowledge-based networking
-
4269/2006(0302-9743):98-111, 15 October
-
D. Lewis, J. Keeney, D. OSullivan, and S. Guo. Towards a managed extensible control plane for knowledge-based networking. Lecture Notes in Computer Science, Large Scale Management of Distributed Systems, Springer Berlin/Heidelberg, 4269/2006(0302-9743):98-111, 15 October, 2006.
-
(2006)
Lecture Notes in Computer Science, Large Scale Management of Distributed Systems, Springer Berlin/Heidelberg
-
-
Lewis, D.1
Keeney, J.2
OSullivan, D.3
Guo, S.4
-
11
-
-
10044277074
-
Semantic message oriented middleware for publish/subscribe networks,
-
H. Li and G. Jiang. Semantic message oriented middleware for publish/subscribe networks,. Sensors, and Command, Control, Communications, and. Intelligence (C3I) Technologies for Homeland Security and Homeland Defense III. In proceedings of the SPIE. In proceedings of the SPIE, 5403:24-133, 2004.
-
(2004)
Sensors, and Command, Control, Communications, and. Intelligence (C3I) Technologies for Homeland Security and Homeland Defense III. In proceedings of the SPIE. In proceedings of the SPIE
, vol.5403
, pp. 24-133
-
-
Li, H.1
Jiang, G.2
-
12
-
-
3242810625
-
Composing adaptive software
-
July
-
P. McKinley, S. Sadjadi, E. Kasten, and B. Cheng. Composing adaptive software. IEEE Computer Society, 37(7):56-64, July, 2004.
-
(2004)
IEEE Computer Society
, vol.37
, Issue.7
, pp. 56-64
-
-
McKinley, P.1
Sadjadi, S.2
Kasten, E.3
Cheng, B.4
-
13
-
-
3242798215
-
-
May, 2004
-
P. McKinley, S. Sadjadi, E. Kasten, and B. Cheng. A taxonomy of compositional adaptation, May, 2004. ftp://ftp.cse.msu.edu/pub/crg/PAPERS/ survey-tr. pdf.
-
A taxonomy of compositional adaptation
-
-
McKinley, P.1
Sadjadi, S.2
Kasten, E.3
Cheng, B.4
-
15
-
-
34548143043
-
A message oriented middleware solution enabling non-repudiation evidence generation for reliable web services
-
0302-9743
-
S. Parkin, D. Ingham, and G. Morgan. A message oriented middleware solution enabling non-repudiation evidence generation for reliable web services. Lecture Notes in Computer Science, Springer Berlin / Heidelberg, 4526/2007(0302-9743):9-19, 06 June, 2007.
-
(2007)
Lecture Notes in Computer Science, Springer Berlin / Heidelberg
, vol.4526
, pp. 9-19
-
-
Parkin, S.1
Ingham, D.2
Morgan, G.3
-
16
-
-
30644473909
-
Adaptive trust negotiation and access control
-
1-3 June
-
T. Ryutov, L. Zhou, C. Neuman, T. Leithead, and K. Sea-mons. Adaptive trust negotiation and access control, in Proc. 10th ACM symposium on Access control models and technologies, pages 139-146, 1-3 June, 2005.
-
(2005)
Proc. 10th ACM symposium on Access control models and technologies
, pp. 139-146
-
-
Ryutov, T.1
Zhou, L.2
Neuman, C.3
Leithead, T.4
Sea-mons, K.5
-
20
-
-
84884691527
-
An adaptable security manager for real-time transactions
-
19-21 June
-
S. H. Son, R. Zimmerman, and J. Hansson. An adaptable security manager for real-time transactions, in Proc. 12th Euromicro Conference on Real-Time Systems, pages 63-70, 19-21 June, 2000.
-
(2000)
Proc. 12th Euromicro Conference on Real-Time Systems
, pp. 63-70
-
-
Son, S.H.1
Zimmerman, R.2
Hansson, J.3
-
21
-
-
58149192204
-
-
Sonic. Progress SonicMQ. http://www.sonicsoftware.com/products/sonicmq/ index.ssp.
-
Progress SonicMQ
-
-
Sonic1
-
23
-
-
84899203852
-
-
TIBCO
-
TIBCO. Rendezvous. http://www.tibco.com/software/messaging/rendezvous/ default.jsp.
-
Rendezvous
-
-
-
24
-
-
0030706556
-
Threat-adaptive security policy
-
5-7 February
-
R. M. Venkatesan and S. Bhattacharya. Threat-adaptive security policy, in Proc. IEEE International Performance, Computing, and Communications Conference, pages 525-531, 5-7 February, 1997.
-
(1997)
Proc. IEEE International Performance, Computing, and Communications Conference
, pp. 525-531
-
-
Venkatesan, R.M.1
Bhattacharya, S.2
-
27
-
-
0037001914
-
Architecture and fuzzy adaptive security algorithm in intelligent firewall, in
-
7-10 October
-
J. Zou, K. Lu, and Z. Jin. Architecture and fuzzy adaptive security algorithm in intelligent firewall, in Proc. MILCOM, 2:1145-1149, 7-10 October, 2002.
-
(2002)
Proc. MILCOM
, vol.2
, pp. 1145-1149
-
-
Zou, J.1
Lu, K.2
Jin, Z.3
|