Sciweavers

2655 search results - page 116 / 531
» Event Systems and Access Control
Sort
View
ICSE
2010
IEEE-ACM
15 years 9 months ago
Customized awareness: recommending relevant external change events
It is often assumed that developers’ view of their system and its environment is always consistent with everyone else’s; in practice, this assumption can be false, as the deve...
Reid Holmes, Robert J. Walker
SRDS
2006
IEEE
15 years 11 months ago
Cryptree: A Folder Tree Structure for Cryptographic File Systems
We present Cryptree, a cryptographic tree structure which facilitates access control in file systems operating on untrusted storage. Cryptree leverages the file system’s folde...
Dominik Grolimund, Luzius Meisser, Stefan Schmid, ...
IKE
2004
15 years 6 months ago
Real-Time Decision Support System for Space Missions Control
- Space weather refers to conditions on the sun and in the solar wind, magnetosphere, ionosphere, and thermosphere that can influence the performance and reliability of space-borne...
João Moura Pires, Marta Pantoquilho, Nuno V...
EDOC
2008
IEEE
15 years 11 months ago
Managing the Life Cycle of Access Rules in CEOSIS
The definition and management of access rules (e.g., to control the access to business documents and business functions) is an important task within any enterprise information sy...
Stefanie Rinderle-Ma, Manfred Reichert
DEXA
2004
Springer
103views Database» more  DEXA 2004»
15 years 10 months ago
Characterizing Database User's Access Patterns
Much work has been done on characterizing the workload of a database system. Previous studies focused on providing different types of statistical summaries, and modeling the run-ti...
Qingsong Yao, Aijun An