Sciweavers

1057 search results - page 144 / 212
» Type-Based Distributed Access Control
Sort
View
DSONLINE
2006
79views more  DSONLINE 2006»
15 years 18 days ago
Integrating Security Policies via Container Portable Interceptors
In the past, it was very common to develop middleware without consideration of security from the very beginning. To integrate security, the middleware that should be protected has...
Tom Ritter, Rudolf Schreiner, Ulrich Lang
110
Voted
IJAHUC
2007
135views more  IJAHUC 2007»
15 years 14 days ago
Service Location Protocols for mobile wireless ad hoc networks
: As service-oriented networks are essential in our lives, service location, access and provisioning over wired or wireless networks govern users’ satisfaction. While they are we...
Chai-Keong Toh, Guillermo Guichal, Dongkyun Kim, V...
HIPC
2009
Springer
14 years 10 months ago
Impact of early abort mechanisms on lock-based software transactional memory
Software transactional memory (STM) is an emerging concurrency control mechanism for shared memory accesses. Early abort is one of the important techniques to improve the executio...
Zhengyu He, Bo Hong
134
Voted
DBKDA
2010
IEEE
127views Database» more  DBKDA 2010»
14 years 11 months ago
Failure-Tolerant Transaction Routing at Large Scale
—Emerging Web2.0 applications such as virtual worlds or social networking websites strongly differ from usual OLTP applications. First, the transactions are encapsulated in an AP...
Idrissa Sarr, Hubert Naacke, Stéphane Gan&c...
111
Voted
ASPLOS
2006
ACM
15 years 6 months ago
Architectural support for software-based protection
Control-Flow Integrity (CFI) is a property that guarantees program control flow cannot be subverted by a malicious adversary, even if the adversary has complete control of data m...
Mihai Budiu, Úlfar Erlingsson, Martí...