Sciweavers

739 search results - page 97 / 148
» Information Flow in Credential Systems
Sort
View
WISA
2007
Springer
14 years 1 months ago
A Compositional Multiple Policies Operating System Security Model
Multilevel security policies aim at only confidentiality assurance, with less consideration on integrity assurance and weakness in expressing channel control policies. Besides, the...
Lei Xia, Wei Huang, Hao Huang
MIDDLEWARE
2007
Springer
14 years 1 months ago
A service-oriented middleware for context-aware applications
Context awareness has emerged as an important element in distributed computing. It offers mechanisms that allow applications to be aware of their environment and enable these appl...
Luiz Olavo Bonino da Silva Santos, Remco Poortinga...
ISSRE
2006
IEEE
14 years 1 months ago
Memoized Forward Computation of Dynamic Slices
Forward computation of dynamic slices is necessary to support interactive debugging and online analysis of long running programs. However, the overhead of existing forward computi...
Wes Masri, Nagi Nahas, Andy Podgurski
ECIS
2003
13 years 9 months ago
A case of 'non strategic' alignment - An IT and business unit liaison role
The nature of higher-level interactions in facilitating strategic alignment has received much attention in the past decade. The study sets out to explore the nature of the interac...
Owen Harte Barry, Brian O'Flaherty
SIGMOD
2005
ACM
117views Database» more  SIGMOD 2005»
14 years 7 months ago
Relational data mapping in MIQIS
We demonstrate a prototype of the relational data mapping module of MIQIS, a formal framework for investigating information flow in peer-to-peer database management systems. Data ...
George H. L. Fletcher, Catharine M. Wyss