Sciweavers

1627 search results - page 134 / 326
» On context in authorization policy
Sort
View
DSN
2006
IEEE
14 years 4 months ago
Dependability Analysis of Virtual Memory Systems
Recent research has shown that even modern hard disks have complex failure modes that do not conform to “failstop” operation. Disks exhibit partial failures like block access ...
Lakshmi N. Bairavasundaram, Andrea C. Arpaci-Dusse...
MSS
2005
IEEE
106views Hardware» more  MSS 2005»
14 years 4 months ago
An Architecture for Lifecycle Management in Very Large File Systems
We present a policy-based architecture STEPS for lifecycle management (LCM) in a mass scale distributed file system. The STEPS architecture is designed in the context of IBM’s ...
Akshat Verma, David Pease, Upendra Sharma, Marc Ka...
VLDB
2005
ACM
90views Database» more  VLDB 2005»
14 years 3 months ago
Getting Priorities Straight: Improving Linux Support for Database I/O
The Linux 2.6 kernel supports asynchronous I/O as a result of propositions from the database industry. This is a positive evolution but is it a panacea? In the context of the Badg...
Christoffer Hall, Philippe Bonnet
ICDCS
1998
IEEE
14 years 2 months ago
Structuring Remote Object Systems for Mobile Hosts with Intermittent Connectivity
In distributed object systems, remote method inattempts to abstract communication between di erent machines to the level of object method invocation. Link failure in such systems ...
Girish Welling, Maximilian Ott
ESORICS
2007
Springer
14 years 2 months ago
Efficient Proving for Practical Distributed Access-Control Systems
We present a new technique for generating a formal proof that an access request satisfies accesscontrol policy, for use in logic-based access-control frameworks. Our approach is t...
Lujo Bauer, Scott Garriss, Michael K. Reiter