Sciweavers

8493 search results - page 1354 / 1699
» Implementing a distributed firewall
Sort
View
ISADS
1999
IEEE
15 years 9 months ago
CORBA based Architecture for Large Scale Workflow
Standard client-server workflow management systems have an intrinsic scalability limitation, the central server, which represents a bottleneck for large-scale applications. This s...
Roberto Silveira Silva Filho, Jacques Wainer, Edmu...
SCCC
1999
IEEE
15 years 9 months ago
Safe-Threads: A New Model for Object-Oriented Multi-Threaded Languages
Threads have been present in programming languages for some time now. However, they have a bad image among software developers because they lead to unreliable applications. Most o...
Luis Mateu, José M. Piquer
SP
1999
IEEE
145views Security Privacy» more  SP 1999»
15 years 9 months ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo
142
Voted
SRDS
1999
IEEE
15 years 9 months ago
An Adaptive Checkpointing Protocol to Bound Recovery Time with Message Logging
Numerous mathematical approaches have been proposed to determine the optimal checkpoint interval for minimizing total execution time of an application in the presence of failures....
Kuo-Feng Ssu, Bin Yao, W. Kent Fuchs
TOOLS
1999
IEEE
15 years 9 months ago
Cooperative Software Development: Concepts, Model and Tools
The development of large software systems demands intensive cooperation among multiple project team members with different responsibilities. The development process is often distr...
Josef Altmann, Gustav Pomberger
« Prev « First page 1354 / 1699 Last » Next »