Sciweavers

274 search results - page 19 / 55
» Resource Instantiation Policies for Software Process Environ...
Sort
View
SACMAT
2003
ACM
14 years 27 days ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
DSVIS
2008
Springer
13 years 9 months ago
ReWiRe: Designing Reactive Systems for Pervasive Environments
The design of interactive software that populates an ambient space is a complex and ad-hoc process with traditional software development approaches. In an ambient space, important ...
Geert Vanderhulst, Kris Luyten, Karin Coninx
SIGMOD
2002
ACM
129views Database» more  SIGMOD 2002»
14 years 7 months ago
Best-effort cache synchronization with source cooperation
In environments where exact synchronization between source data objects and cached copies is not achievable due to bandwidth or other resource constraints, stale (out-of-date) cop...
Chris Olston, Jennifer Widom
EUROSYS
2009
ACM
14 years 2 months ago
SnowFlock: rapid virtual machine cloning for cloud computing
Virtual Machine (VM) fork is a new cloud computing abstraction that instantaneously clones a VM into multiple replicas running on different hosts. All replicas share the same init...
Horacio Andrés Lagar-Cavilla, Joseph Andrew...
ESEM
2009
ACM
14 years 2 months ago
Using security metrics coupled with predictive modeling and simulation to assess security processes
: © Using Security Metrics Coupled with Predictive Modeling and Simulation to Assess Security Processes Yolanta Beres, Marco Casassa Mont, Jonathan Griffin, Simon Shiu HP Laborato...
Yolanta Beres, Marco Casassa Mont, Jonathan Griffi...