Sciweavers

177 search results - page 11 / 36
» Access Control Based on Execution History
Sort
View
HPCA
1999
IEEE
13 years 11 months ago
Improving CC-NUMA Performance Using Instruction-Based Prediction
We propose Instruction-based Prediction as a means to optimize directory-based cache coherent NUMA shared-memory. Instruction-based prediction is based on observing the behavior o...
Stefanos Kaxiras, James R. Goodman
ICIW
2008
IEEE
14 years 1 months ago
Leveraging Integrated Tools for Model-Based Analysis of Service Compositions
—Developing service compositions, using multiple standards and implementation techniques, typically involves specifying service characteristics in different languages and tools. ...
Howard Foster, Philip Mayer
ACSAC
2002
IEEE
14 years 14 days ago
Safe Virtual Execution Using Software Dynamic Translation
Safe virtual execution (SVE) allows a host computer system to reduce the risks associated with running untrusted programs. SVE prevents untrusted programs from directly accessing ...
Kevin Scott, Jack W. Davidson
CJ
1999
80views more  CJ 1999»
13 years 7 months ago
Resolving Executing-Committing Conflicts in Distributed Real-time Database Systems
In a distributed real-time database system (DRTDBS), a commit protocol is required to ensure transaction failure atomicity. If data conflicts occur between executing and committin...
Kam-yiu Lam, Chung-Leung Pang, Sang Hyuk Son, Jian...
SACMAT
2011
ACM
12 years 10 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deď¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...