Sciweavers

3274 search results - page 31 / 655
» Access Support in Object Bases
Sort
View
ACSC
2005
IEEE
14 years 2 months ago
Auction Based Resource Negotiation in NOMAD
The challenges faced by mobile and distributed applications include the ability to discover and negotiate for the resources required for execution. The NOMAD (Negotiated Object Mo...
Kris Bubendorfer, John H. Hine
SIGOPSE
1992
ACM
14 years 17 days ago
System support for shared objects
This position paper supports the view that a model based on shared objects is an attractive alternative to message passing for structuring distributed applications and that a distr...
Pierre-Yves Chevalier, Daniel Hagimont, Sacha Krak...
EDBT
2006
ACM
129views Database» more  EDBT 2006»
14 years 9 months ago
Efficient Quantile Retrieval on Multi-dimensional Data
Given a set of N multi-dimensional points, we study the computation of -quantiles according to a ranking function F, which is provided by the user at runtime. Specifically, F compu...
Man Lung Yiu, Nikos Mamoulis, Yufei Tao
ACSC
2002
IEEE
14 years 2 months ago
Bracket Capabilities for Distributed Systems Security
The per-method access control lists of standard middleware technologies allow only simple forms of access control to be expressed and enforced. Research systems based on capabilit...
Mark Evered
DBSEC
2006
115views Database» more  DBSEC 2006»
13 years 10 months ago
Creating Objects in the Flexible Authorization Framework
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not ...
Nicola Zannone, Sushil Jajodia, Duminda Wijesekera