Sciweavers

316 search results - page 58 / 64
» Variations in Access Control Logic
Sort
View
CSFW
2005
IEEE
14 years 1 months ago
Nomad: A Security Model with Non Atomic Actions and Deadlines
Modelling security policies requires means to specify permissions and prohibitions. However, this is generally not sufficient to express security properties such as availability ...
Frédéric Cuppens, Nora Cuppens-Boula...
CODES
2003
IEEE
14 years 25 days ago
A low-cost memory architecture with NAND XIP for mobile embedded systems
NAND flash memory has become an indispensable component in mobile embedded systems because of its versatile features such as non-volatility, solid-state reliability, low cost and ...
Chanik Park, Jaeyu Seo, Sunghwan Bae, Hyojun Kim, ...
IEEEAMS
2003
IEEE
14 years 25 days ago
Programming Systems for Autonomy
This paper describes a new approach to programming autonomic systems. Autonomic functions are integrated into element objects at design time using a special language called JSpoon...
Alexander V. Konstantinou, Yechiam Yemini
IICS
2003
Springer
14 years 22 days ago
Mobile Business Processes
Today’s global markets demand global processes. Increasingly, these processes are not only distributed, but also contain mobile aspects. We discuss two challenges brought about b...
Volker Gruhn, Matthias Book
VLDB
1993
ACM
112views Database» more  VLDB 1993»
13 years 11 months ago
Specifying and Enforcing Intertask Dependencies
Extensions of the traditional atomic transaction model are needed to support the development of multi-system applications or work ows that access heterogeneous databases and legac...
Paul C. Attie, Munindar P. Singh, Amit P. Sheth, M...