Sciweavers

481 search results - page 72 / 97
» Analyzing and Managing Role-Based Access Control Policies
Sort
View
IADIS
2004
13 years 10 months ago
Constructing digital libraries with quality
Digital Libraries can be considered islands of specialized collections on the Web, which have their own management policy to control publishing and access, offering an environment...
Ewerton M. Salvador, José Jorge L. D. Jr., ...
EUROSSC
2006
Springer
14 years 17 days ago
Context-Aware Trust Domains
Context-aware service platforms need to establish and manage trust relationships for users to know if the user's privacy policies are being enforced and for service providers ...
Ricardo Neisse, Maarten Wegdam, Marten van Sindere...
LISA
2007
13 years 11 months ago
Decision Support for Virtual Machine Re-Provisioning in Production Environments
Management of virtual machines (VMs) on a large scale remains a significant challenge today. We lack general and vendor-independent quantitative criteria/metrics by which to desc...
Kyrre M. Begnum, Matthew Disney, Æleen Frisc...
SISW
2005
IEEE
14 years 2 months ago
Towards Protecting Sensitive Files in a Compromised System
Protecting sensitive files from a compromised system helps administrator to thwart many attacks, discover intrusion trails, and fast restore the system to a safe state. However, ...
Xin Zhao, Kevin Borders, Atul Prakash
RTSS
2008
IEEE
14 years 3 months ago
Predictable Interrupt Management and Scheduling in the Composite Component-Based System
This paper presents the design of user-level scheduling hierarchies in the Composite component-based system. The motivation for this is centered around the design of a system that...
Gabriel Parmer, Richard West