Sciweavers

178 search results - page 28 / 36
» Access control for a replica management database
Sort
View
CIDR
2011
221views Algorithms» more  CIDR 2011»
12 years 10 months ago
Deuteronomy: Transaction Support for Cloud Data
The Deuteronomy system supports efficient and scalable ACID transactions in the cloud by decomposing functions of a database storage engine kernel into: (a) a transactional compon...
Justin J. Levandoski, David B. Lomet, Mohamed F. M...
ACSW
2003
13 years 8 months ago
A Secure Pervasive Environment
This paper explores the complications encountered when attempting to create a secure pervasive computing environment. The model introduced in this paper is primarily conceptual. T...
Patrick G. McLean
SAC
2008
ACM
13 years 6 months ago
A cost-driven approach to role engineering
In recent years role-based access control (RBAC) has been spreading within organizations. However, companies still have considerable difficulty migrating to this model, due to the...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
ADBIS
1997
Springer
131views Database» more  ADBIS 1997»
13 years 11 months ago
Centralized versus Distributed Index Schemes in OODBMS - A Performance Analysis
Recent work on client-server data-shipping OODBs has demonstratedthe usefulnessof localdatacachingat clientsites. In addition to data caching, index caching can provide substantia...
Julie Basu, Arthur M. Keller, Meikel Pöss
EWSA
2004
Springer
14 years 3 days ago
Generation and Enactment of Controllers for Business Architectures Using MDA
Model Driven Architecture (MDA) is an initiative of the OMG in which the software development process is driven by various software-related models describing the software to be gen...
Günter Graw, Peter Herrmann