The original publication is available at www.springerlink.comThe compliant systems architecture (CSA) is a structuring methodology for constructing software systems that exhibit strict separation of policy and mechanism. Components of an instantiated CSA adapt to their environment under application control. This ability to evolve allows a single system to provide optimal support for arbitrary applications through flexible policy specification. Applications may determine their preferred level of participation in the specification of policy. In a distributed database system, two-phase commit (2PC) delineates a family of algorithms governed by policies that affect different performance, overhead and recovery characteristics. Whilst the literat...
Copyright © 2002 IEEEThere exists a wide spectrum of coherency models for use in distributed shared ...
Abstract | In this article we describe a componentized framework for dynamic security policies. The ...
Over the past 20 years much research has been done on developing architectures and transaction manag...
© Copyright 2008 IEEEAn increasingly common server deployment scenario involves dedicated servers su...
Special Issue on InformaticsSoftware architectures are designed to meet the needs of the application...
Distributed software systems are increasingly used to support business applications. This requires t...
This paper describes an architectural approach that facilitates the dynamic adaptation of systems to...
Policy enforcement, or making sure that software behaves in line with a set of rules, is a problem o...
Abstract:- Two-phase commit work well for centralized database, but in distributed database it creat...
Service Oriented Architectures (SOA's) enable powerful application and end user service composition ...
The correct deployment and enforcement of expressive attri- bute-based access control (ABAC) policie...
Policies are rules that govern the choices in behaviour of a system. Security policies define what a...
As database systems have grown in terms of scale and complexity, administration tasks have become in...
In order to cope with consistency-preserving operations (i.e. transactions) over distributed and het...
Transactional standards in distributed transactional systems, allows heterogeneous resources to part...
Copyright © 2002 IEEEThere exists a wide spectrum of coherency models for use in distributed shared ...
Abstract | In this article we describe a componentized framework for dynamic security policies. The ...
Over the past 20 years much research has been done on developing architectures and transaction manag...
© Copyright 2008 IEEEAn increasingly common server deployment scenario involves dedicated servers su...
Special Issue on InformaticsSoftware architectures are designed to meet the needs of the application...
Distributed software systems are increasingly used to support business applications. This requires t...
This paper describes an architectural approach that facilitates the dynamic adaptation of systems to...
Policy enforcement, or making sure that software behaves in line with a set of rules, is a problem o...
Abstract:- Two-phase commit work well for centralized database, but in distributed database it creat...
Service Oriented Architectures (SOA's) enable powerful application and end user service composition ...
The correct deployment and enforcement of expressive attri- bute-based access control (ABAC) policie...
Policies are rules that govern the choices in behaviour of a system. Security policies define what a...
As database systems have grown in terms of scale and complexity, administration tasks have become in...
In order to cope with consistency-preserving operations (i.e. transactions) over distributed and het...
Transactional standards in distributed transactional systems, allows heterogeneous resources to part...
Copyright © 2002 IEEEThere exists a wide spectrum of coherency models for use in distributed shared ...
Abstract | In this article we describe a componentized framework for dynamic security policies. The ...
Over the past 20 years much research has been done on developing architectures and transaction manag...