Sciweavers

89 search results - page 4 / 18
» The Efficient Maintenance of Access Roles with Role Hiding
Sort
View
AOSD
2005
ACM
15 years 3 months ago
Role-based refactoring of crosscutting concerns
Improving the structure of code can help developers work with a software system more efficiently and more consistently. To aid developers in re-structuring the implementation of c...
Jan Hannemann, Gail C. Murphy, Gregor Kiczales
CCS
2007
ACM
15 years 3 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder
ICDE
1999
IEEE
101views Database» more  ICDE 1999»
15 years 11 months ago
Index Merging
Indexes play a vital role in decision support systems by reducing the cost of answering complex queries. A popular methodology for choosing indexes that is adopted by database adm...
Surajit Chaudhuri, Vivek R. Narasayya
72
Voted
ISLPED
1997
ACM
114views Hardware» more  ISLPED 1997»
15 years 1 months ago
Analysis of power consumption in memory hierarchies
In this paper, we note and analyze a key trade-off: as the complexity of caches increases (higher set-associativity, larger block size, and larger overall size), the power consume...
Patrick Hicks, Matthew Walnock, Robert Michael Owe...
CIKM
2005
Springer
15 years 3 months ago
A function-based access control model for XML databases
XML documents are frequently used in applications such as business transactions and medical records involving sensitive information. Typically, parts of documents should be visibl...
Naizhen Qi, Michiharu Kudo, Jussi Myllymaki, Hamid...