Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Mohammad Ashiqur Rahaman"'
Publikováno v:
IEEE Access, Vol 12, Pp 159952-159965 (2024)
Collaborative Deep Neural Network Inference (CDNN) has emerged as one of the significant strategies for efficient and lightweight computation on resource-constrained devices (like drones), especially in the case of adverse events like natural disaste
Externí odkaz:
https://doaj.org/article/3a7b49454cc64688a78fc297d37e3fb4
Publikováno v:
WETICE
Intrusion detection systems (IDS) look for digital patterns mainly over the network or host traffic. Increasing complexity of todays enterprise information systems (EIS) obliges enterprises to deploy multiple but yet isolated IDSs in their IT boundar
Autor:
Nikolaos Georgantas, Hamid Ameziani, Valérie Issarny, Mohammad Ashiqur Rahaman, Animesh Pathak
Publikováno v:
Advances in Grid and Pervasive Computing ISBN: 9783642207532
GPC
GPC
Integration of heterogeneous distributed systems becomes particularly challenging when these systems have diverse coordination models (e.g., client/server, publish/subscribe, tuple space). In this paper, we introduce a system integration solution bas
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e5f4559ea50c72f606612b9e603ac438
https://doi.org/10.1007/978-3-642-20754-9_23
https://doi.org/10.1007/978-3-642-20754-9_23
Publikováno v:
Trust Management V ISBN: 9783642221996
IFIPTM
IFIP Advances in Information and Communication Technology
5th International Conference on Trust Management (TM)
5th International Conference on Trust Management (TM), Jun 2011, Copenhagen, Denmark. pp.51-66, ⟨10.1007/978-3-642-22200-9_7⟩
IFIPTM
IFIP Advances in Information and Communication Technology
5th International Conference on Trust Management (TM)
5th International Conference on Trust Management (TM), Jun 2011, Copenhagen, Denmark. pp.51-66, ⟨10.1007/978-3-642-22200-9_7⟩
Part 2: Full Papers; International audience; Computational trust is a central paradigm in today's Internet as our modern society is increasingly relying upon online transactions and social net- works. This is indeed leading to the introduction of var
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::524c4e27785ccbbda7dcff5e080edb02
Publikováno v:
EDBT/ICDT Workshops
The OASIS eXtensible Access Control Language (XACML) provides an interoperable tool for writing and enforcing access control policies based on attributes, i.e. characteristics of the entities that take part to the access, such as subjects or actions.
Publikováno v:
SERVICES II
Task-based workflows describe a set of predefinedtasks executed in a predefined sequence flow in whichdocuments representing business objects are sent to activate tasks according to some business goal. The increasingly agile nature of business proces
Publikováno v:
IAS
Collaborating on complex XML data structures is a non-trivial task in domains such as the public sector,healthcare or engineering. Specifically, providing scalable XML content dissemination services in a selective and secure fashion is a challenging
Publikováno v:
Emerging Challenges for Security, Privacy and Trust ISBN: 9783642012433
SEC
SEC
This paper presents an ontology-driven secure XML content distribution scheme. This scheme first relies on a semantic access control model for XML documents that achieves three objectives: (1) representing flexible and evolvable policies, (2) providi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d9c116e1d608cdde940029d22068e411
https://doi.org/10.1007/978-3-642-01244-0_26
https://doi.org/10.1007/978-3-642-01244-0_26
Publikováno v:
ICIW
Comparing different versions of large tree structured data is a CPU and memory intensive task. State of the art techniques require the complete XML trees and their internal representations to be loaded into memory before any comparison may start. Fur
Publikováno v:
EDOC
This paper introduces a distributed and fine grained access control mechanism based on encryption for XML document centric collaborative applications. This mechanism also makes it possible to simultaneously protect the confidentiality of a document a