Sciweavers

841 search results - page 33 / 169
» Data Encapsulation in Software Components
Sort
View
VLDB
2002
ACM
165views Database» more  VLDB 2002»
13 years 9 months ago
Chip-Secured Data Access: Confidential Data on Untrusted Servers
The democratization of ubiquitous computing (access data anywhere, anytime, anyhow), the increasing connection of corporate databases to the Internet and the today's natural ...
Luc Bouganim, Philippe Pucheral
CSFW
1999
IEEE
14 years 1 months ago
Secure Composition of Insecure Components
Software systems are becoming heterogeneous: instead of a small number of large programs from well-established sources, a user's desktop may now consist of many smaller compo...
Peter Sewell, Jan Vitek
SIGMOD
2008
ACM
143views Database» more  SIGMOD 2008»
14 years 9 months ago
A case study in database reliability: component types, usage profiles, and testing
Data management lies at the core of most modern information technology deployments. Accordingly, the reliability of the database management system (DBMS) is critical to the reputa...
C. A. Taylor, Mechelle Gittens, Andriy V. Miransky...
ICCSA
2007
Springer
14 years 1 months ago
Component Specification for Parallel Coupling Infrastructure
Coupled systems comprise multiple interacting subsystems and are an increasingly common computational science application, most notably as multiscale and multiphysics models. Paral...
Jay Walter Larson, Boyana Norris
WCRE
2000
IEEE
14 years 2 months ago
Revisiting the Delta IC Approach to Component Recovery
Component recovery supports program understanding, architecture recovery, and re-use. Among the best known techniques for detection of re-usable objects (related global variables ...
Gerardo Canfora, Jörg Czeranski, Rainer Kosch...