Sciweavers

715 search results - page 114 / 143
» On Run-Time Enforcement of Policies
Sort
View
DEBS
2008
ACM
13 years 9 months ago
Access control in publish/subscribe systems
Two convincing paradigms have emerged for achieving scalability in widely distributed systems: publish/subscribe communication and role-based, policy-driven control of access to t...
Jean Bacon, David M. Eyers, Jatinder Singh, Peter ...
FASE
2008
Springer
13 years 9 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
ICDE
2010
IEEE
178views Database» more  ICDE 2010»
13 years 7 months ago
Autonomic workload execution control using throttling
— Database Management Systems (DBMSs) are often required to simultaneously process multiple diverse workloads while enforcing business policies that govern workload performance. ...
Wendy Powley, Patrick Martin, Mingyi Zhang, Paul B...

Presentation
609views
15 years 6 months ago
Bus transit service planning and operations in a competitive environment
Transit services are currently facing several challenges in the United States and around the world. For many reasons, among which the fluctuations in gas prices and the state of t...
A. M. El-Geneidy, J. Hourdos, J. Horning
POPL
2005
ACM
14 years 8 months ago
Precise interprocedural analysis using random interpretation
We describe a unified framework for random interpretation that generalizes previous randomized intraprocedural analyses, and also extends naturally to efficient interprocedural an...
Sumit Gulwani, George C. Necula