Sciweavers

354 search results - page 65 / 71
» Key management for content access control in a hierarchy
Sort
View
ISCA
2007
IEEE
174views Hardware» more  ISCA 2007»
15 years 3 months ago
An integrated hardware-software approach to flexible transactional memory
There has been considerable recent interest in the support of transactional memory (TM) in both hardware and software. We present an intermediate approach, in which hardware is us...
Arrvindh Shriraman, Michael F. Spear, Hemayet Hoss...
OTM
2009
Springer
15 years 4 months ago
TMBean: Optimistic Concurrency in Application Servers Using Transactional Memory
Abstract. In this experience report, we present an evaluation of different techniques to manage concurrency in the context of application servers. Traditionally, using entity beans...
Lucas Charles, Pascal Felber, Christophe Gêt...
SIGMOD
2003
ACM
123views Database» more  SIGMOD 2003»
15 years 9 months ago
The hyperion project: from data integration to data coordination
We present an architecture and a set of challenges for peer database management systems. These systems team up to build a network of nodes (peers) that coordinate at run time most...
Marcelo Arenas, Vasiliki Kantere, Anastasios Kemen...
NSDI
2007
14 years 12 months ago
TightLip: Keeping Applications from Spilling the Beans
Access control misconfigurations are widespread and can result in damaging breaches of confidentiality. This paper presents TightLip, a privacy management system that helps user...
Aydan R. Yumerefendi, Benjamin Mickle, Landon P. C...
CORR
2010
Springer
176views Education» more  CORR 2010»
14 years 9 months ago
Emergency Response Communications and Associated Security Challenges
The natural or man-made disaster demands an efficient communication and coordination among first responders to save life and other community resources. Normally, the traditional c...
Muhammad Ibrahim Channa, Kazi M. Ahmed