Sciweavers

196 search results - page 19 / 40
» A Hacking View of Access Control
Sort
View
WECWIS
2009
IEEE
198views ECommerce» more  WECWIS 2009»
14 years 4 months ago
Bridging the Gap between User Attributes and Service Policies with Attribute Mapping
—People, companies, and public authorities can now have a strong on-line presence and a huge amount of interactions on the Internet, made possible by the impressive growth of the...
Davide Cerri, Francesco Corcoglioniti
ACSAC
2001
IEEE
14 years 1 months ago
Why Information Security is Hard-An Economic Perspective
According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of cryptographic protocols, approved ...
Ross J. Anderson
FAST
2009
13 years 7 months ago
Minuet: Rethinking Concurrency Control in Storage Area Networks
Clustered applications in storage area networks (SANs), widely adopted in enterprise datacenters, have traditionally relied on distributed locking protocols to coordinate concurre...
Andrey Ermolinskiy, Daekyeong Moon, Byung-Gon Chun...
EWSA
2004
Springer
14 years 3 months ago
Generation and Enactment of Controllers for Business Architectures Using MDA
Model Driven Architecture (MDA) is an initiative of the OMG in which the software development process is driven by various software-related models describing the software to be gen...
Günter Graw, Peter Herrmann
SIGMOD
2007
ACM
161views Database» more  SIGMOD 2007»
14 years 9 months ago
Homeviews: peer-to-peer middleware for personal data sharing applications
This paper presents HomeViews, a peer-to-peer middleware system for building personal data management applications. HomeViews provides abstractions and services for data organizat...
Roxana Geambasu, Magdalena Balazinska, Steven D. G...