Sciweavers

1057 search results - page 144 / 212
» Type-Based Distributed Access Control
Sort
View
105
Voted
DSONLINE
2006
79views more  DSONLINE 2006»
15 years 2 months ago
Integrating Security Policies via Container Portable Interceptors
In the past, it was very common to develop middleware without consideration of security from the very beginning. To integrate security, the middleware that should be protected has...
Tom Ritter, Rudolf Schreiner, Ulrich Lang
129
Voted
IJAHUC
2007
135views more  IJAHUC 2007»
15 years 2 months ago
Service Location Protocols for mobile wireless ad hoc networks
: As service-oriented networks are essential in our lives, service location, access and provisioning over wired or wireless networks govern users’ satisfaction. While they are we...
Chai-Keong Toh, Guillermo Guichal, Dongkyun Kim, V...
HIPC
2009
Springer
15 years 3 days ago
Impact of early abort mechanisms on lock-based software transactional memory
Software transactional memory (STM) is an emerging concurrency control mechanism for shared memory accesses. Early abort is one of the important techniques to improve the executio...
Zhengyu He, Bo Hong
DBKDA
2010
IEEE
127views Database» more  DBKDA 2010»
15 years 27 days ago
Failure-Tolerant Transaction Routing at Large Scale
—Emerging Web2.0 applications such as virtual worlds or social networking websites strongly differ from usual OLTP applications. First, the transactions are encapsulated in an AP...
Idrissa Sarr, Hubert Naacke, Stéphane Gan&c...
ASPLOS
2006
ACM
15 years 8 months ago
Architectural support for software-based protection
Control-Flow Integrity (CFI) is a property that guarantees program control flow cannot be subverted by a malicious adversary, even if the adversary has complete control of data m...
Mihai Budiu, Úlfar Erlingsson, Martí...