Sciweavers

1989 search results - page 138 / 398
» Integrity Management in Component Based Systems
Sort
View
DBSEC
2000
110views Database» more  DBSEC 2000»
15 years 6 months ago
Role-Based Security in a Distributed Resource Environment
There are many technologies for distributed processing/interoperation, including CORBA, DCE, DCOM, Enterprise Java Beans, Java IDL, JDBC, etc. Most promising, is the emergence of ...
Steven A. Demurjian, T. C. Ting, J. Balthazar, H. ...
SSDBM
2002
IEEE
116views Database» more  SSDBM 2002»
15 years 9 months ago
A Conceptual Framework for Composing and Managing Scientific Data Lineage
Scientific research relies as much on the dissemination and exchange of data sets as on the publication of conclusions. Accurately tracking the lineage (origin and subsequent proc...
Rajendra Bose
155
Voted
STORAGESS
2005
ACM
15 years 10 months ago
Ensuring data integrity in storage: techniques and applications
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for stora...
Gopalan Sivathanu, Charles P. Wright, Erez Zadok
ISF
2007
119views more  ISF 2007»
15 years 4 months ago
Managing the false alarms: A framework for assurance and verification of surveillance monitoring
This article discusses methods to support assurance of surveillance monitoring; and compliance verification knowledge management (CV-KM). The discussion includes aspects of primar...
Peter Goldschmidt
ACSD
2008
IEEE
108views Hardware» more  ACSD 2008»
15 years 6 months ago
Modular construction of finite and complete prefixes of Petri net unfoldings
This paper considers distributed systems, defined as a collection of components interacting through interfaces. Components, interfaces and distributed systems are modeled as Petri...
Agnes Madalinski, Eric Fabre