Sciweavers

351 search results - page 55 / 71
» Formalisation and implementation of Access control models
Sort
View
93
Voted
ECOOPW
2003
Springer
15 years 5 months ago
Advancing the State of the Art in Run-Time Inspection
levels of abstraction. Lacking well-established technologies and models for representing and accessing program dynamics, tools must use ad-hoc mechanisms. This limits reuse and int...
Robert E. Filman, Katharina Mehner, Michael Haupt
CIDR
2011
274views Algorithms» more  CIDR 2011»
14 years 4 months ago
Cloud Resource Orchestration: A Data-Centric Approach
Cloud computing provides users near instant access to seemingly unlimited resources, and provides service providers the opportunity to deploy complex information technology infras...
Yun Mao, Changbin Liu, Jacobus E. van der Merwe, M...
ICDE
2007
IEEE
164views Database» more  ICDE 2007»
15 years 6 months ago
Multi-session Separation of Duties (MSoD) for RBAC
Separation of duties (SoD) is a key security requirement for many business and information systems. Role Based Access Controls (RBAC) is a relatively new paradigm for protecting i...
David W. Chadwick, Wensheng Xu, Sassa Otenko, Roma...
98
Voted
SC
2005
ACM
15 years 6 months ago
Making Sequential Consistency Practical in Titanium
The memory consistency model in parallel programming controls the order in which operations performed by one thread may be observed by another. Language designers have been reluct...
Amir Kamil, Jimmy Su, Katherine A. Yelick
PDPTA
2004
15 years 1 months ago
Service Oriented Web Based Meta Resource Sharing Platform - The CBWeB Portal
Grid computing and cluster computing platforms are becoming the primary development platforms for pervasive computing. The primary problem associated with both computational grids...
Avinash Shankar, Daniel Saffioti, Ian Piper, Ashwi...