Sciweavers

376 search results - page 68 / 76
» Integrity constraints in trust management
Sort
View
ADAEUROPE
2001
Springer
15 years 4 months ago
Building Formal Requirements Models for Reliable Software
Requirements engineering (RE) is concerned with the elicitation of the goals to be achieved by the system envisioned, the operationalization of such goals into specifications of se...
Axel van Lamsweerde
DAWAK
2001
Springer
15 years 4 months ago
Shared Index Scans for Data Warehouses
Tree based indexing structures like -trees, ·-trees, Bitmap indexes and Ê-trees have become essential for getting good performance when accessing vast datasets. However, most dat...
Yannis Kotidis, Yannis Sismanis, Nick Roussopoulos
KIVS
2001
Springer
15 years 4 months ago
Real-Time Support on Top of Ethernet
Ethernet is a widely used low-cost networking technology. It however lacks the determinism and resource management features needed to meet realtime requirements of multimedia appli...
Rainer Koster, Thorsten Kramp
HICSS
1999
IEEE
152views Biometrics» more  HICSS 1999»
15 years 4 months ago
Incorporating Semantic Relationships into an Object-Oriented Database System
Semantic relationships, those class-to-class connections that carry inherent support for constraints and various other functionalities, play an important role when building inform...
Li-min Liu, Michael Halper
SP
1999
IEEE
145views Security Privacy» more  SP 1999»
15 years 4 months ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo