Sciweavers

555 search results - page 103 / 111
» Management Requirements of Web Service Compositions
Sort
View
SIGMOD
2006
ACM
116views Database» more  SIGMOD 2006»
14 years 10 months ago
Simultaneous scalability and security for data-intensive web applications
For Web applications in which the database component is the bottleneck, scalability can be provided by a third-party Database Scalability Service Provider (DSSP) that caches appli...
Amit Manjhi, Anastassia Ailamaki, Bruce M. Maggs, ...
HICSS
2005
IEEE
137views Biometrics» more  HICSS 2005»
14 years 3 months ago
Facilitating Human Collaboration with Agents
Ad hoc cross-agency teams are often needed to deal with actual, imminent, or potential crises that involve multiple geographic or political jurisdictions or require coordinated ex...
James E. Just, Mark R. Cornwell, Michael N. Huhns
COMAD
2008
13 years 11 months ago
The Efficient Maintenance of Access Roles with Role Hiding
Role-based access control (RBAC) has attracted considerable research interest. However, the computational issues of RBAC models are yet to be thoroughly studied. In this paper, we...
Chaoyi Pang, Xiuzhen Zhang, Yanchun Zhang, Kotagir...
EDOC
2003
IEEE
14 years 3 months ago
Model Driven Security: Unification of Authorization Models for Fine-Grain Access Control
The research vision of the Unified Component Meta Model Framework (UniFrame) is to develop an infrastructure for components that enables a plug and play component environment wher...
Carol C. Burt, Barrett R. Bryant, Rajeev R. Raje, ...
SIGUCCS
2003
ACM
14 years 3 months ago
Teamwork is the heart of technology
IAT Services, the central Information Technology group at the University of Missouri-Columbia, operates computing sites in general access, classroom, and residence hall settings. ...
Tammy Hohlt, Kristina A. Cunningham