Sciweavers

293 search results - page 38 / 59
» A Logical Approach to Multilevel Security of Probabilistic S...
Sort
View
SIGCOMM
2009
ACM
14 years 2 months ago
Diverter: a new approach to networking within virtualized infrastructures
As virtualized data-centres become the back-end platforms behind a new generation of utility and cloud computing infrastructures (such as AmazonAWS [1]) their multi-tenancy, scale...
Aled Edwards, Anna Fischer, Antonio Lain
IEEEARES
2008
IEEE
14 years 2 months ago
Reliability Analysis using Graphical Duration Models
Reliability analysis has become an integral part of system design and operating. This is especially true for systems performing critical tasks such as mass transportation systems....
Roland Donat, Laurent Bouillaut, Patrice Aknin, Ph...
DKE
2002
130views more  DKE 2002»
13 years 7 months ago
Smart card embedded information systems: a methodology for privacy oriented architectural design
The design of very small databases for smart cards and for portable embedded systems is deeply constrained by the peculiar features of the physical medium. Privacy concerns are re...
Cristiana Bolchini, Fabio A. Schreiber
SIGMOD
2006
ACM
142views Database» more  SIGMOD 2006»
14 years 8 months ago
Model driven development of secure XML databases
In this paper, we propose a methodological approach for the model driven development of secure XML databases (DB). This proposal is within the framework of MIDAS, a model driven m...
Belén Vela, Eduardo Fernández-Medina, Esperanza ...
IEEEARES
2008
IEEE
14 years 2 months ago
Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements
—Data warehouse (DW) systems integrate data from heterogeneous sources and are used by decision makers to analyze the status and the development of an organization. Traditionally...
Emilio Soler, Veronika Stefanov, Jose-Norberto Maz...