Transaction delegation, as introduced in ACTA, allows a transaction to transfer responsibility for the operations that it has performed on an object to another transaction. Delegation can be used to broaden the visibility of the delegatee, and to tailor the recovery properties of a transaction model. Delegation has been shown to be useful in synthesizing advanced transaction models. With an efficient implementation of delegation it becomes practicable to realize various advanced transaction models whose requirements are specified at a high level language instead of the current expensive practice of building them from scratch. The authors identify the issues in efficiently supporting delegation and hence advanced transaction models, and illu...
~hstt~ct A simple and efficient recovery method for nested transact.ions, called ARIES/NT (Algorithm...
In decentralized network-based environments, resource sharing occurs more frequently as computing be...
In ownership-based access control frameworks with the possibility of delegating permissions and admi...
Transaction delegation, as introduced in ACTA, allows a transaction to transfer responsibility for t...
The notion of transaction delegation, as introduced in ACTA, has been shown to be useful in synthesi...
The characteristics of delegation are analyzed and defined in this paper, including time, totality, ...
Abstract: Transaction management is an essential component of database manage-ment systems. It enabl...
The ability of transactions to mask the effects of concurrency and failures makes them appropriate b...
International audienceIn the field of access control, delegation is an important aspect that is cons...
One reason workflow systems have been criticized as being inflexible is that they lack support for d...
In this paper we present a simple and efficient method, called ARIES ( Algorithm for Recouery and Is...
In this paper we present a simple and efficient method, called ARIES ( Algorithm for Recouery and Is...
We describe a model and notation for specifying and enforcing aspects of integrity policies, particu...
Abstract. The transaction abstraction is arguably one of the most ap-pealing middleware paradigms. I...
Part 4: Access Control IIInternational audienceIn this paper we first introduce a logic for describi...
~hstt~ct A simple and efficient recovery method for nested transact.ions, called ARIES/NT (Algorithm...
In decentralized network-based environments, resource sharing occurs more frequently as computing be...
In ownership-based access control frameworks with the possibility of delegating permissions and admi...
Transaction delegation, as introduced in ACTA, allows a transaction to transfer responsibility for t...
The notion of transaction delegation, as introduced in ACTA, has been shown to be useful in synthesi...
The characteristics of delegation are analyzed and defined in this paper, including time, totality, ...
Abstract: Transaction management is an essential component of database manage-ment systems. It enabl...
The ability of transactions to mask the effects of concurrency and failures makes them appropriate b...
International audienceIn the field of access control, delegation is an important aspect that is cons...
One reason workflow systems have been criticized as being inflexible is that they lack support for d...
In this paper we present a simple and efficient method, called ARIES ( Algorithm for Recouery and Is...
In this paper we present a simple and efficient method, called ARIES ( Algorithm for Recouery and Is...
We describe a model and notation for specifying and enforcing aspects of integrity policies, particu...
Abstract. The transaction abstraction is arguably one of the most ap-pealing middleware paradigms. I...
Part 4: Access Control IIInternational audienceIn this paper we first introduce a logic for describi...
~hstt~ct A simple and efficient recovery method for nested transact.ions, called ARIES/NT (Algorithm...
In decentralized network-based environments, resource sharing occurs more frequently as computing be...
In ownership-based access control frameworks with the possibility of delegating permissions and admi...