Sciweavers

1236 search results - page 110 / 248
» Efficient Interpretation Policies
Sort
View
ICDE
2002
IEEE
143views Database» more  ICDE 2002»
14 years 10 months ago
Declarative Composition and Peer-to-Peer Provisioning of Dynamic Web Services
The development of new services through the integration of existing ones has gained a considerable momentum as a means to create and streamline business-to-business collaborations...
Boualem Benatallah, Quan Z. Sheng, Anne H. H. Ngu,...
ICFP
2008
ACM
14 years 9 months ago
AURA: a programming language for authorization and audit
This paper presents AURA, a programming language for access control that treats ordinary programming constructs (e.g., integers and recursive functions) and authorization logic co...
Limin Jia, Jeffrey A. Vaughan, Karl Mazurak, Jianz...
QEST
2009
IEEE
14 years 3 months ago
On the Impact of Modelling Choices for Distributed Information Spread
—We consider a distributed shuffling algorithm for sharing data in a distributed network. Nodes executing the algorithm periodically contact each other and exchange data. The be...
Rena Bakhshi, Ansgar Fehnker
CDC
2008
IEEE
120views Control Systems» more  CDC 2008»
14 years 3 months ago
Approximate abstractions of discrete-time controlled stochastic hybrid systems
ate Abstractions of Discrete-Time Controlled Stochastic Hybrid Systems Alessandro D’Innocenzo, Alessandro Abate, and Maria D. Di Benedetto — This work proposes a procedure to c...
Alessandro D'Innocenzo, Alessandro Abate, Maria Do...
ACSAC
2007
IEEE
14 years 3 months ago
Quarantining Untrusted Entities: Dynamic Sandboxing Using LEAP
Jails, Sandboxes and other isolation mechanisms limit the damage from untrusted programs by reducing a process’s privileges to the minimum. Sandboxing is designed to thwart such...
Manigandan Radhakrishnan, Jon A. Solworth