Sciweavers

92 search results - page 4 / 19
» Enhancing the Object Constraint Language for More Expressive...
Sort
View
TKDE
2008
177views more  TKDE 2008»
13 years 7 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
EUROMICRO
1999
IEEE
13 years 11 months ago
Validation of Object Oriented Models using Animation
Experience has shown that prototypingis a valuabletechnique in the validation of designs. However, the prototype(s) can be too far semantically removed from the design. Animation ...
Ian Oliver, Stuart Kent
MIDDLEWARE
2000
Springer
13 years 11 months ago
Customization of Object Request Brokers by Application Specific Policies
This paper presents an architectural framework for customizing Object Request Broker (ORB) implementations to application-specific preferences for various non-functional requiremen...
Bo Nørregaard Jørgensen, Eddy Truyen...
CORR
2004
Springer
151views Education» more  CORR 2004»
13 years 7 months ago
Finite-Tree Analysis for Constraint Logic-Based Languages: The Complete Unabridged Version
Logic languages based on the theory of rational, possibly infinite, trees have much appeal in that rational trees allow for faster unification (due to the safe omission of the occ...
Roberto Bagnara, Roberta Gori, Patricia M. Hill, E...
IFIP
1994
Springer
13 years 11 months ago
The specification of business rules: A comparison of selected methodologies
Business rules are an important element of information systems. The notion business rule encompasses different phenomena; therefore, some classification criteria are presented and...
Holger Herbst, Gerhard Knolmayer, Thomas Myrach, M...