Sciweavers

1530 search results - page 116 / 306
» Design and Implementation of a Key-Lifecycle Management Syst...
Sort
View
122
Voted
ICSE
2007
IEEE-ACM
16 years 3 months ago
Reconceptualizing a Family of Heterogeneous Embedded Systems via Explicit Architectural Support
It has been widely advocated that software architecture an effective set of abstractions for engineering (families of) complex software systems. However, architectural concepts ar...
Sam Malek, Chiyoung Seo, Sharmila Ravula, Brad Pet...
141
Voted
SACMAT
2003
ACM
15 years 8 months ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
122
Voted
INFOCOM
2008
IEEE
15 years 10 months ago
Run-Time System for Scalable Network Services
Sophisticated middlebox services–such as network monitoring and intrusion detection, DDoS mitigation, worm scanning, XML parsing and protocol transformation–are becoming incre...
Upendra Shevade, Ravi Kokku, Harrick M. Vin
114
Voted
COMPSAC
2001
IEEE
15 years 7 months ago
Certificate Based Authorization Simulation System
Using certificates for distributed authorizations in computer network systems has been discussed in the literature. However real implementations of the concept are rarely seen. In...
Jie Dai, Jim Alves-Foss
129
Voted
VLDB
1995
ACM
113views Database» more  VLDB 1995»
15 years 7 months ago
Efficient Incremental Garbage Collection for Client-Server Object Database Systems
We describe an eficient server-based algorithm for garbage collecting object-oriented databases in a client/server environment. The algorithm is incremental and runs concurrently ...
Laurent Amsaleg, Michael J. Franklin, Olivier Grub...