Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Joosen, Wouter Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 4 of 4 reviews    
  PERSIST: policy-based data management middleware for multi-tenant SaaS leveraging federated cloud storage
Rafique A., Van Landuyt D., Joosen W. Journal of Grid Computing 16(2): 165-194, 2018.  Type: Article

NoSQL application data stores often combine on-premise and public cloud resources. As a consequence, they may deal with heterogeneous technologies, flexible but less structured storage architectures, and dynamic changes. In this paper,...
...
Jan 9 2019  
  Access control in multi-party wireless sensor networks
Maerien J., Michiels S., Huygens C., Hughes D., Joosen W.  EWSN 2013 (Proceedings of the 10th European Conference on Wireless Sensor Networks, Ghent, Belgium, Feb 13-15, 2013) 34-49, 2013.  Type: Proceedings

This paper presents an access control infrastructure for resource-constrained wireless sensor nodes. The infrastructure uses a protocol based on symmetrical encryption for authentication and a role-based access control framework for au...
...
Oct 9 2013  
  Instruction-level countermeasures against stack-based buffer overflow attacks
Gadaleta F., Younan Y., Jacobs B., Joosen W., De Neve E., Beosier N.  VTDS 2009 (Proceedings of the 1st EuroSys Workshop on Virtualization Technology for Dependable Systems, Nuremberg, Germany, Mar 31, 2009) 7-12, 2009.  Type: Proceedings

Gadaleta et al. explore the use of virtualization “to implement a countermeasure against buffer overflow attacks.” The idea is to emulate the already existing techniques--in particular, the return address d...
...
Jun 22 2009  
  Implementing a modular access control service to support application-specific policies in CaesarJ
Verhanneman T., Piessens F., De Win B., Truyen E., Joosen W.  Aspect-oriented middleware development (Proceedings of the 1st Workshop on Aspect Oriented Middleware Development, Grenoble, France, Nov 28-Dec 2, 2005) Article 5 2005.  Type: Proceedings

This paper describes a novel programming method for inserting a modular access control mechanism. It seems to be an attractive approach to reducing or eliminating traditional hardcoding of application access control logic. A new progra...
...
Jun 1 2006  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy