Sciweavers

715 search results - page 22 / 143
» Integration of Access Control in Information Systems: From R...
Sort
View
ICSEA
2008
IEEE
14 years 1 months ago
Reuse through Requirements Traceability
The Reuse of code artefacts can make development quicker, cheaper and more robust, but the process is complex and has many pitfalls: Code artefacts must exist, be available, be fo...
Rob Pooley, Craig Warren
ECOOPW
1999
Springer
13 years 11 months ago
Providing Policy-Neutral and Transparent Access Control in Extensible Systems
Extensible systems, such as Java or the SPIN extensible operating system, allow for units of code, or extensions, to be added to a running system in almost arbitrary fashion. Exte...
Robert Grimm, Brian N. Bershad
SIGOPSE
2000
ACM
13 years 11 months ago
Position paper: the role of platforms and operating systems in supporting home networks
As researchers look beyond the PC there is increasing interest in developing and deploying sophisticated home networks. Such networks might allow the seamless integration of infor...
Nigel Davies, Pierre-Guillaume Raverdy
ICSE
2000
IEEE-ACM
13 years 11 months ago
Integrating UML diagrams for production control systems
This paper proposes to use SDL block diagrams, UML class diagrams, and UML behavior diagrams like collaboration diagrams, activity diagrams, and statecharts as a visual programmin...
Hans J. Köhler, Ulrich Nickel, Jörg Nier...
IDEAS
2006
IEEE
99views Database» more  IDEAS 2006»
14 years 1 months ago
Securing the Borealis Data Stream Engine
As data stream management systems (DSMSs) become more and more popular, there is an increasing need to protect such systems from adversaries. In this paper we present an approach ...
Wolfgang Lindner, Jörg Meier