Sciweavers

177 search results - page 17 / 36
» Access Control Based on Execution History
Sort
View
BPM
2006
Springer
149views Business» more  BPM 2006»
15 years 3 months ago
Verifying BPEL Workflows Under Authorisation Constraints
Abstract. Business Process Execution Language (BPEL), or Web Services BPEL (WS-BPEL), is the standard for specifying workflow process definition using web services. Research on for...
Zhao Xiangpeng, Antonio Cerone, Padmanabhan Krishn...
ICS
2000
Tsinghua U.
15 years 5 months ago
Push vs. pull: data movement for linked data structures
As the performance gap between the CPU and main memory continues to grow, techniques to hide memory latency are essential to deliver a high performance computer system. Prefetchin...
Chia-Lin Yang, Alvin R. Lebeck
CAL
2006
15 years 1 months ago
Adopting system call based address translation into user-level communication
User-level communication alleviates the software overhead of the communication subsystem by allowing applications to access the network interface directly. For that purpose, effici...
Moon-Sang Lee, Sang-Kwon Lee, Joonwon Lee, Seung R...
WWW
2010
ACM
15 years 8 months ago
Alhambra: a system for creating, enforcing, and testing browser security policies
Alhambra is a browser-based system designed to enforce and test web browser security policies. At the core of Alhambra is a policyenhanced browser supporting fine-grain security ...
Shuo Tang, Chris Grier, Onur Aciiçmez, Samu...
ISORC
2005
IEEE
15 years 7 months ago
A GTRBAC Based System for Dynamic Workflow Composition and Management
In this paper, we propose an architecture for adaptive real-time workflow-based collaborative system. Such a system is needed to support real-time communication and sharing of inf...
Basit Shafiq, Arjmand Samuel, Halima Ghafoor