Sciweavers

591 search results - page 49 / 119
» Embracing policy engineering
Sort
View
HOTSWUP
2009
ACM
15 years 2 months ago
Automating Database Schema Evolution in Information System Upgrades
The complexity, cost, and down-time currently created by the database schema evolution process is the source of incessant problems in the life of information systems and a major s...
Carlo Curino, Hyun Jin Moon, Carlo Zaniolo
IADIS
2004
14 years 11 months ago
Mastering the mystery through 'SAIQ' metrics of user experience in telecollaboration business systems
In the preparation of technology transition, the contextual and alternative definitions of the usability heuristics of multifaceted role of the best practice methodology of Teleco...
Venkatesh Mahadevan, Zenon Chaczko, Robin Braun
ISSTA
2006
ACM
15 years 3 months ago
Role-Based access control consistency validation
Modern enterprise systems support Role-Based Access Control (RBAC). Although RBAC allows restricting access to privileged operations, a deployer may actually intend to restrict ac...
Paolina Centonze, Gleb Naumovich, Stephen J. Fink,...
SOSP
2007
ACM
15 years 6 months ago
Improving file system reliability with I/O shepherding
We introduce a new reliability infrastructure for file systems called I/O shepherding. I/O shepherding allows a file system developer to craft nuanced reliability policies to de...
Haryadi S. Gunawi, Vijayan Prabhakaran, Swetha Kri...
ESSOS
2010
Springer
15 years 6 months ago
CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests
Protecting users in the ubiquitous online world is becoming more and more important, as shown by web application security – or the lack thereof – making the mainstream news. On...
Philippe De Ryck, Lieven Desmet, Thomas Heyman, Fr...