In database applications, access control is aimed at requests are mainly formalized by Create, Read, Update and Delete (CRUD)expressions. The supervision process can be formalized at a high level, such as based on the RBAC model, but in the end the relevant aspect is the data being accessed through each CRUD expression. In critical database applications access control can be enforced not on a CRUD by CRUD bas...
Call Level Interfaces (CLI) are low level API aimed at providing services to connect two main components in database applications: client applications and relational databases. Among their functionalities, the ability to manage data retrieved from databases is emphasized. The retrieved data is kept in local memory structures that may be permanently connected to the host database. Client applications, beyond the...
Call Level Interfaces (CLI) are difficult to use mainly in intensive database applications with many Create, Read, Update and Delete (CRUD) expressions. As low level API, they are not suited to promote the development process of business tiers as reusable components, leading to the need of writing additional source code whenever a new CRUD expression is needed. To tackle this gap, this paper proposes an archite...
Access control is a key challenge in software engineering, especially in relational database applications. Current access control techniques are based on additional security layers designed by security experts. These additional security layers do not take into account the necessary business logic leading to a separation between business tiers and access control mechanisms. Moreover, business tiers are built fro...
Access control is a key challenge in software engineering, especially in relational database applications. Current access control techniques are based on additional security layers designed by security experts. These additional security layers do not take into account the necessary business logic leading to a separation between business tiers and access control mechanisms. Moreover, business tiers are built fro...
The increased demand for multimedia services by mobile end users in recent years have driven both Broadcast and Wireless Network operators to develop new systems and architectures for the deployment of such services. The proposed solutions are nonetheless limited either in terms of QoS or Capabilities to deliver new interactive services. This paper highlights strengths and drawbacks of the existing technologies...
This paper presents an experimental sectored receiver for infrared wireless networks. The receiver comprises two sectors, each with a switched gain front-end and a signal-to-noise ratio estimator. These are then interconnected with a best-sector selector unit, able to compensate the gain switching characteristics of the front-ends. The circuit has been designed in a 0.8 μm CMOS technology.
One of the key aspects for many-core and cloud operating systems is message passing communication. The networking aspect of this mechanism requires a high degree of concurrency to handle communicating with thousands of cores simultaneously in an efficient and scalable manner. Non-blocking interfaces allows us to efficiently use a core and gives us concurrency without multiple threads, this also minimizes contex...
Programmers of relational database applications use software solutions (Hibernate, JDBC, LINQ, ADO.NET) to ease the development process of business tiers. These software solutions were not devised to address access control policies, much less for evolving access control policies, in spite of their unavoidable relevance. Currently, access control policies, whenever implemented, are enforced by independent compon...
The past few years, miniaturization has allowed usto imbue computers into everyday devices. This in turn hasenabled these devices to communicate with each other, and in doing so, allows us to collect a wealth of information, moreaccurately and with greater availability than ever before. Thisphenomenon is known as the Internet of Things. It allows smart environments to truly behave in an intelligent manner by us...
Financiadores do RCAAP | |||||||
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |