Sciweavers

592 search results - page 38 / 119
» Modelling the Behaviour of Management Operations in Cloud-ba...
Sort
View
129
Voted
SC
2004
ACM
15 years 9 months ago
VMPlants: Providing and Managing Virtual Machine Execution Environments for Grid Computing
Virtual machines provide flexible, powerful execution environments for Grid computing, offering isolation and security mechanisms complementary to operating systems, customization...
Ivan Krsul, Arijit Ganguly, Jian Zhang, José...
120
Voted
COOPIS
2004
IEEE
15 years 7 months ago
Security Management Through Overloading Views
The model of overloading views is a facility allowing the programmer to separate some kinds of crosscutting concerns that occur during design, implementation and maintenance of dat...
Radoslaw Adamus, Kazimierz Subieta
139
Voted
ACMICEC
2006
ACM
112views ECommerce» more  ACMICEC 2006»
15 years 9 months ago
Persistent information security: beyond the e-commerce threat model
This paper introduces a new class of information security solution. The core technology, to authorize and track the use of digital files, was originally developed in eCommerce app...
Merv Matson, Mihaela Ulieru
145
Voted
CAISE
2000
Springer
15 years 8 months ago
Design Principles for Application Integration
Application integration is a major trend in information technology today. In this paper we present a number of principles for the design, validation and presentation of process mod...
Paul Johannesson, Erik Perjons
166
Voted
EUROSYS
2008
ACM
16 years 22 days ago
Manageable fine-grained information flow
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Petros Efstathopoulos, Eddie Kohler