Sciweavers

517 search results - page 81 / 104
» The Design and Implementation of the GridLab Information Ser...
Sort
View
SACMAT
2003
ACM
15 years 5 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
SIGMOD
2012
ACM
242views Database» more  SIGMOD 2012»
13 years 2 months ago
Dynamic management of resources and workloads for RDBMS in cloud: a control-theoretic approach
As cloud computing environments become explosively popular, dealing with unpredictable changes, uncertainties, and disturbances in both systems and environments turns out to be on...
Pengcheng Xiong
WWW
2010
ACM
15 years 5 months ago
Reining in the web with content security policy
The last three years have seen a dramatic increase in both awareness and exploitation of Web Application Vulnerabilities. 2008 and 2009 saw dozens of high-profile attacks against...
Sid Stamm, Brandon Sterne, Gervase Markham
HICSS
2009
IEEE
105views Biometrics» more  HICSS 2009»
15 years 6 months ago
The Visual Wiki: A New Metaphor for Knowledge Access and Management
Successful knowledge management results in a competitive advantage in today’s information- and knowledge-rich industries. The elaboration and integration of emerging web-based t...
Christian Hirsch, John G. Hosking, John C. Grundy,...
MDM
2009
Springer
133views Communications» more  MDM 2009»
15 years 6 months ago
YushanNet: A Delay-Tolerant Wireless Sensor Network for Hiker Tracking in Yushan National Park
The objective of YushanNet is to provide a reliable and robust system for hiker tracking in Yushan National Park, Taiwan. The aggregated information can help national parks to pro...
Yu-Te Huang, Yi-Chao Chen, Jyh-How Huang, Ling-Jyh...