- 1. Chandra, N., "Analysis of Superplastic Metal Forming by a Finite Element Method", International Journal for Numerical Methods in Engineering, Vol. 26, 1988, pp. 1925-1944.Google ScholarCross Ref
- 2. Deshmukh, A., Middelkoop, T., Krothapalli, A., Shields, W., Zhang, C., Chandra, N., Challa, M., and Smith, C., "Multi-Agent design Architecture for Integrated design Systems", American Institute of Aeronautics and Astronautics Paper 98-0914, 1998.Google Scholar
- 3. Duchessi, P., and Chengalur-Smith, I., "Client/Server Benefits, Problems, Best Practices", Communications of The ACM, Vol. 41, No. 5, May 1998, pp. 87- 94. Google ScholarDigital Library
- 4. "Middleware White Paper", International Systems Group, Inc. 1997, http://www.openvms.digital.com/openvms/ whitepapers/middleware/isgmidware.html# WhatisMiddleware.Google Scholar
- 5. Joshi, A., Ramakrishnan, N., and Houstis, E., "Multiagent System Support of Networked Scientific Computing", IEEE Internet Computing, Vol. 2, No. 3, May/June 1998, pp. 69-83. Google ScholarDigital Library
- 6. Macgregor, R. S., Arest, A., and Siegert, A., WWW Security, Prentice-Hall, Inc., 1996, ISBN 0-13-612409-7.Google Scholar
- 7. Oppliger, R., "Internet Security: Firewalls and Beyond", Communications of The ACM, Vol. 40, No. 5, May 1997, pp. 92- 102. Google ScholarDigital Library
- 8. Ousterhout, J., "Scripting: Higher Level Programming for 21st Century", IEEE Computer, Vol. 2, No. 2, March 1998, pp. 23-30. Google ScholarDigital Library
- 9. Rubin, A., and Geer, D., "A Survey of Web Security", IEEE Computer, Vol. 31, No. 9, September 1998, pp. 34-41. Google ScholarDigital Library
- 10. Schefstrom, D., "Tool Integration" John Wiley & Sons Ltd., 1993, ISBN 0-471- 93554-9.Google Scholar
Index Terms
- Design and implementation of IBIDS—an Internet based integrated design system
Recommendations
The Design and Implementation of Improved Secure Cookies Based on Certificate
INDOCRYPT '02: Proceedings of the Third International Conference on Cryptology: Progress in CryptologyThe HTTP does not support continuity for browser-server interaction between successive visits of a user due to a stateless feature. Cookies were invented to maintain continuity and state on the Web. Because cookies are transmitted in plain and contain ...
The design of secure node system based on integrated security engine (SNSISE)
CIMMACS'05: Proceedings of the 4th WSEAS international conference on Computational intelligence, man-machine systems and cyberneticsConventional security systems provide the functions like intrusion detection, intrusion prevention and VPN individually, leading to management inconvenience and high cost. To solve these problems, attention has been paid on the integrated security ...
The design of XML-based internet security integrated system architecture
ICCS'03: Proceedings of the 2003 international conference on Computational scienceTo protect networks from intrusions and attacks, many vendors have developed various security systems. Managing these systems individually demands much work and high cost. To decrease these overheads, we have developed an Internet Security Integrated ...
Comments