Sciweavers

177 search results - page 35 / 36
» From Business Process Choreography to Authorization Policies
Sort
View
SACMAT
2010
ACM
13 years 10 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
QEST
2007
IEEE
13 years 11 months ago
A business-oriented load dispatching framework for online auction sites
Online auction sites have unique workloads and user behavior characteristics that do not exist in other e-commerce sites. Earlier studies by the authors identified i) significan...
Daniel A. Menascé, Vasudeva Akula
ICAIL
2003
ACM
13 years 10 months ago
Using Ontologies for Comparing and Harmonizing Legislation
In the last decades the interest in the problem of comparing and harmonizing legislation has been steadily increasing. One reason is the increasing legal convergence between gover...
Alexander Boer, Tom M. van Engers, Radboud Winkels
DAC
2004
ACM
14 years 6 months ago
A SAT-based algorithm for reparameterization in symbolic simulation
Parametric representations used for symbolic simulation of circuits usually use BDDs. After a few steps of symbolic simulation, state set representation is converted from one para...
Pankaj Chauhan, Edmund M. Clarke, Daniel Kroening
WOSP
2004
ACM
13 years 10 months ago
Early performance testing of distributed software applications
Performance characteristics, such as response time, throughput and scalability, are key quality attributes of distributed applications. Current practice, however, rarely applies s...
Giovanni Denaro, Andrea Polini, Wolfgang Emmerich