Sciweavers

2071 search results - page 57 / 415
» Behaviour Management in Database Applications
Sort
View
CISIS
2010
IEEE
14 years 3 months ago
Extending Security-by-Contract with Quantitative Trust on Mobile Devices
Abstract—Security-by-Contract (S×C) is a paradigm providing security assurances for mobile applications. In this work, we present an extension of S×C enriched with an automatic...
Gabriele Costa, Nicola Dragoni, Aliaksandr Lazousk...
DBSEC
2010
162views Database» more  DBSEC 2010»
13 years 10 months ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang
ADBIS
1998
Springer
180views Database» more  ADBIS 1998»
14 years 1 months ago
Designing Persistence for Real-Time Distributed Object Systems
An implementation of persistent object store for real-time systems with strict processing time constraints is a challenging task, because many traditional database techniques, e.g....
Igor Nekrestyanov, Boris Novikov, Ekaterina Pavlov...
SIGMOD
2007
ACM
174views Database» more  SIGMOD 2007»
14 years 9 months ago
The microsoft data platform
Advances in hardware, storage, devices, connectivity, and web technology are changing the way applications are designed, deployed, and managed. Applications are increasingly becom...
David Campbell, Anil Nori
ER
2004
Springer
139views Database» more  ER 2004»
14 years 2 months ago
A Sociological Framework for Multi-agent Systems Validation and Verification
Social and intentional behaviours appear as two main components of the agent paradigm. Methods of conventional software engineering do not seem to be appropriate to gain a full kno...
Rubén Fuentes, Jorge J. Gómez-Sanz, ...