Sciweavers

591 search results - page 61 / 119
» Embracing policy engineering
Sort
View
134
Voted
IS
2006
15 years 3 months ago
Adaptive cycle management in soft real-time disk retrieval
The objective of this study is to determine the right cycle management policy to service periodic soft real-time disk retrieval. Cycle based disk scheduling provides an effective ...
Youjip Won, Ilhoon Shin, Kern Koh
134
Voted
CSSE
2004
IEEE
15 years 3 months ago
AdOrBAC: an administration model for Or-BAC
Even though the final objective of an access control model is to provide a framework to decide if actions performed by subjects on objects are permitted or not, it is not convenie...
Frédéric Cuppens, Alexandre Mi&egrav...
WWW
2005
ACM
16 years 4 months ago
User-centric Web crawling
Search engines are the primary gateways of information access on the Web today. Behind the scenes, search engines crawl the Web to populate a local indexed repository of Web pages...
Sandeep Pandey, Christopher Olston
ESSOS
2010
Springer
16 years 18 days ago
Automatic Generation of Smart, Security-Aware GUI Models
In many software applications, users access application data using graphical user interfaces (GUIs). There is an important, but little explored, link between visualization and secu...
David A. Basin, Manuel Clavel, Marina Egea, Michae...
123
Voted
ADAEUROPE
2009
Springer
15 years 10 months ago
Weak Fairness Semantic Drawbacks in Java Multithreading
With the development of embedded and mobile systems, Java is widely used for application programs and is also considered for implementing systems kernel or application platforms. I...
Claude Kaiser, Jean-François Pradat-Peyre