Sciweavers

1627 search results - page 138 / 326
» On context in authorization policy
Sort
View
ICSOC
2007
Springer
14 years 4 months ago
Service Selection Based on Non-functional Properties
Service-oriented Architecture supports software to be composed from services dynamically. Selecting and composing appropriate services according to business process, policies and n...
Stephan Reiff-Marganiec, HongQing Yu, Marcel Tilly
IWANN
2009
Springer
14 years 3 months ago
User Configuration of Activity Awareness
This paper describes an approach to user configuration of activity awareness. This approach offers users increased flexibility by allowing the use of multiple methods of configurat...
Tony McBryan, Philip D. Gray
ICMCS
2000
IEEE
95views Multimedia» more  ICMCS 2000»
14 years 2 months ago
Descriptive-Procedural Configuration of Communication Bindings
Although declarative configurability still predominates in the context of communication bindings, the hidden policies involved make it an unlikely candidate to cope with the ever...
Thorsten Kramp, Rainer Koster
VLDB
1991
ACM
132views Database» more  VLDB 1991»
14 years 1 months ago
Fido: A Cache That Learns to Fetch
This paper describesFido, a predictive cache [Palmer 19901that prefetchesby employing an associativememoryto recognizeaccesspatterns within a context over time. Repeatedtraining a...
Mark Palmer, Stanley B. Zdonik
ISCAPDCS
2004
13 years 11 months ago
A Framework for Role-Based Access Control in Group Communication Systems
In this paper we analyze the requirements access control mechanisms must fulfill in the context of group communication and define a framework for supporting fine-grained access co...
Cristina Nita-Rotaru, Ninghui Li