Sciweavers

6303 search results - page 1047 / 1261
» A Generated Management for Distributed Systems
Sort
View
113
Voted
SP
1999
IEEE
145views Security Privacy» more  SP 1999»
15 years 8 months ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo
129
Voted
ICSE
1999
IEEE-ACM
15 years 8 months ago
A Cooperative Approach to Support Software Deployment Using the Software Dock
Software deployment is an evolving collection of interrelated processes such as release, install, adapt, reconfigure, update, activate, deactivate, remove, and retire. The connect...
Richard S. Hall, Dennis Heimbigner, Alexander L. W...
145
Voted
SAFECOMP
1999
Springer
15 years 7 months ago
Hierarchically Performed Hazard Origin and Propagation Studies
Abstract. This paper introduces a new method for safety analysis called HiPHOPS (Hierarchically Performed Hazard Origin and Propagation Studies). HiP-HOPS originates from a number ...
Yiannis Papadopoulos, John A. McDermid
116
Voted
ATAL
2007
Springer
15 years 7 months ago
Towards valuation-aware agent-based traffic control
Traffic authorities work hard to improve resource utilization in traffic. But these efforts do not consider that the valuations of waiting time can be different for each driver, e...
Heiko Schepperle, Klemens Böhm, Simone Forste...
151
Voted
AUTONOMICS
2007
ACM
15 years 7 months ago
A framework to support multiple reconfiguration strategies
Self-management is a key feature of autonomic systems. This often demands the dynamic reconfiguration of a distributed application. An important issue in the reconfiguration proce...
Liliana Rosa, Luís Rodrigues, Antóni...
« Prev « First page 1047 / 1261 Last » Next »