Sciweavers

6348 search results - page 123 / 1270
» Extensible control architectures
Sort
View
142
Voted
ACSAC
2001
IEEE
15 years 7 months ago
A Component-Based Architecture for Secure Data Publication
We present an approach for controlling access to data publishers in the framework of Web-based information services. The paper presents a model for enforcing access control regula...
Piero A. Bonatti, Ernesto Damiani, Sabrina De Capi...
CORR
2004
Springer
129views Education» more  CORR 2004»
15 years 3 months ago
Runtime Reconfiguration of J2EE Applications
: Runtime reconfiguration considered as "applying required changes to a running system" plays an important role for providing high availability not only of safety- and mi...
Jasminka Matevska-Meyer, Sascha Olliges, Wilhelm H...
SEC
2007
15 years 5 months ago
A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy
Location-Based Access Control (LBAC) systems support the evaluation of conditions on locations in the enforcement of access control policies. The ability to evaluate conditions on ...
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...
ISCA
2002
IEEE
104views Hardware» more  ISCA 2002»
15 years 3 months ago
Speculative Dynamic Vectorization
Traditional vector architectures have shown to be very effective for regular codes where the compiler can detect data-level parallelism. However, this SIMD parallelism is also pre...
Alex Pajuelo, Antonio González, Mateo Valer...
POS
1994
Springer
15 years 8 months ago
Concurrent Shadow Paging in the Flask Architecture
The differing requirements for concurrency models in programming languages and databases are widely diverse and often seemingly incompatible. The rigid provision of a particular c...
David S. Munro, Richard C. H. Connor, Ronald Morri...