Sciweavers

635 search results - page 38 / 127
» A Context-Sensitive Access Control Model and Prototype Imple...
Sort
View
PPOPP
2009
ACM
14 years 2 months ago
NePalTM: design and implementation of nested parallelism for transactional memory systems
Abstract. Transactional memory (TM) promises to simplify construction of parallel applications by allowing programmers to reason about interactions between concurrently executing c...
Haris Volos, Adam Welc, Ali-Reza Adl-Tabatabai, Ta...
ICMCS
1996
IEEE
123views Multimedia» more  ICMCS 1996»
13 years 11 months ago
Dynamic QoS Control Based on the QoS-Ticket Model
The most notable characteristic of continuous-media data is the existence of timing constraints. To handle such data appropriately, some system support for resource management and...
Kiyokuni Kawachiya, Hideyuki Tokuda
SACMAT
2006
ACM
14 years 1 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
VLDB
2007
ACM
225views Database» more  VLDB 2007»
14 years 7 months ago
An Approach to Optimize Data Processing in Business Processes
In order to optimize their revenues and profits, an increasing number of businesses organize their business activities in terms of business processes. Typically, they automate imp...
Marko Vrhovnik, Holger Schwarz, Oliver Suhre, Bern...
SACMAT
2003
ACM
14 years 26 days ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...