Sciweavers

209 search results - page 29 / 42
» Exploiting Information Relationships for Access Control
Sort
View
HT
2007
ACM
14 years 2 months ago
A semantics-based aspect-oriented approach to adaptation in web engineering
In the modern Web, users are accessing their favourite Web applications from any place, at any time and with any device. In this setting, they expect the application to user-tailo...
Sven Casteleyn, William Van Woensel, Geert-Jan Hou...
JECR
2002
120views more  JECR 2002»
13 years 10 months ago
Strategic Connectivity in Extended Enterprise Networks
Extended enterprises are networks of organizations interconnected to exchange critical resources, such as raw materials, labor, access to markets, specialized skills and knowledge...
John Tillquist
CODES
2005
IEEE
14 years 4 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
PLDI
2010
ACM
14 years 8 months ago
Pacer: Proportional Detection of Data Races
Data races indicate serious concurrency bugs such as order, atomicity, and sequential consistency violations. Races are difficult to find and fix, often manifesting only in deploy...
Michael D. Bond, Katherine E. Coons, Kathryn S. Mc...
SYSTOR
2009
ACM
14 years 5 months ago
DHIS: discriminating hierarchical storage
A typical storage hierarchy comprises of components with varying performance and cost characteristics, providing multiple options for data placement. We propose and evaluate a hie...
Chaitanya Yalamanchili, Kiron Vijayasankar, Erez Z...