Eclipses by circumstellar material in the T Tauri star AA Tau-II. Evidence for non-stationary magnetospheric accretion
J Bouvier, KN Grankin, SHP Alencar… - Astronomy & …, 2003 - aanda.org
We report the results of a synoptic study of the photometric and spectroscopic variability of
the classical T Tauri star AA Tau on timescales ranging from a few hours to several weeks …
the classical T Tauri star AA Tau on timescales ranging from a few hours to several weeks …
[PDF][PDF] Conceptual model and architecture of MAFTIA
D Powell, R Stroud - … Series-University of Newcastle Upon Tyne …, 2003 - maftia.cs.ncl.ac.uk
Conceptual Model and Architecture of MAFTIA Page 1 Project IST-1999-11583 Malicious- and
Accidental-Fault Tolerance for Internet Applications Conceptual Model and Architecture of …
Accidental-Fault Tolerance for Internet Applications Conceptual Model and Architecture of …
Conceptual model and architecture of MAFTIA
This deliverable builds on the work reported in [MAFTIA 2000] and [Powell and Stroud
2001]. It contains a further refinement of the MAFTIA conceptual model and a revised …
2001]. It contains a further refinement of the MAFTIA conceptual model and a revised …
Modèles et politiques de sécurité pour les domaines de la santé et des affaires sociales
A Abou El Kalam - 2003 - theses.hal.science
Ce mémoire propose une démarche pour définir des politiques de sécurité adaptées aux
systèmes d'informations et de communication en santé et social (SICSS). Ces systèmes …
systèmes d'informations et de communication en santé et social (SICSS). Ces systèmes …
[PDF][PDF] An intrusion-tolerant authorization scheme for internet applications
Y Deswarte, N Abghour, V Nicomette… - Proc. Int'l Conf …, 2002 - webhost.laas.fr
This paper presents an authorization scheme for applications distributed on the Internet with
two levels of access control: a global level, implemented through a faultand intrusion …
two levels of access control: a global level, implemented through a faultand intrusion …
[PDF][PDF] Conceptual model and architecture
D Powell, RJ Stroud, A Adelsbach… - Department of …, 2001 - maftia.cs.ncl.ac.uk
This deliverable builds on the work reported in MAFTIA deliverable D1 [Cachin et al. 2000a].
It contains a refinement of the MAFTIA conceptual model and a discussion of the MAFTIA …
It contains a refinement of the MAFTIA conceptual model and a discussion of the MAFTIA …
Hardware support for high performance, intrusion-and fault-tolerant systems
GP Saggese, C Basile, L Romano… - Proceedings of the …, 2004 - ieeexplore.ieee.org
The paper proposes a combined hardware/software approach for realizing high
performance, intrusion-and fault-tolerant services. The approach is demonstrated for (yet not …
performance, intrusion-and fault-tolerant services. The approach is demonstrated for (yet not …
[PDF][PDF] Protection de la vie privée sur Internet
Y Deswartes, CA Mechor, V Nicomette… - REVUE DE L …, 2006 - webhost.laas.fr
❖ Critères Communs (ISO 15408): une classe de fonctionnalité, 4 propriétés: o Anonymat:
impossibilité (pour d'autres utilisateurs) de déterminer le véritable nom de l'utilisateur …
impossibilité (pour d'autres utilisateurs) de déterminer le véritable nom de l'utilisateur …
MAFTIA conceptual model and architecture
This document builds on the work reported in MAFTIA deliverable D1. It contains a
refinement of the MAFTIA conceptual model and a discussion of the MAFTIA architecture. It …
refinement of the MAFTIA conceptual model and a discussion of the MAFTIA architecture. It …
Intrusion-tolerant middleware: The MAFTIA approach
The pervasive interconnection of systems all over the world has given computer services a
significant socio-economic value, which can be affected both by accidental faults and by …
significant socio-economic value, which can be affected both by accidental faults and by …