Types for Role-based Access Control of Dynamic Web Data
|
|
|
- Bathsheba Turner
- 10 years ago
- Views:
Transcription
1 Types for Role-based Access Control of Dynamic Web Data Mariangiola Dezani-Ciancaglini 1 Silvia Ghilezan 2 Svetlana Jakšić 2 Jovanka Pantović 2 1 Università di Torino 2 University of Novi Sad SVARM 2010, Edinburgh
2 Outline 1 Motivation Related Work Access control - RXdπ-calculus 2 RXdπ-calculus Syntax Semantics 3 Types Types Safety
3 Outline 1 Motivation Related Work Access control - RXdπ-calculus 2 RXdπ-calculus Syntax Semantics 3 Types Types Safety
4 Distributed systems - decentralised peer-to-peer networks management of semi-structured and distributed data processes with different roles have different access rights different access policies in different locations exchange between data and processes preserving access control dynamic changes of access rights One solution - typed models control of access control of movements rights
5 Distributed systems - decentralised peer-to-peer networks management of semi-structured and distributed data processes with different roles have different access rights different access policies in different locations exchange between data and processes preserving access control dynamic changes of access rights One solution - typed models control of access control of movements rights
6 Related work Xdπ calculus - extension of Active XML - Gardner, Maffeis localised mobile processes distributed, dynamic, semi-structured web data Variety of type systems for dπ and related calculi controlling the use of accesses and mobility of processes Security types for Xdπ Dezani, Ghilezan, Pantovic, Varacca, 2008 partially ordered set (with bottom) as security levels control of movements rights network invariant and initial network
7 Distributed Network Location l T R Location A peer or a location is represented with data and a process.
8 Access Rights l l T R T S m T R Security conditions not all data is visible to all processes different locations with different access policies
9 Roles st pr CLASSROOM PUBLIC login {st} login {st} enable(st) login pr pr connection {pr} connection {st}
10 Roles st pr CLASSROOM PUBLIC login {st} login {st} enable(st) login pr pr connection {pr} connection {st}
11 Roles st pr CLASSROOM PUBLIC login {st} login {st} enable(st) login pr pr connection {pr} connection {st}
12 Outline 1 Motivation Related Work Access control - RXdπ-calculus 2 RXdπ-calculus Syntax Semantics 3 Types Types Safety
13 Locations, Networks l T R Each location consists of data in a form of a tree and a process A well-formed network is a parallel composition ( ) of locations with different names. N ::= 0 N N l[t R] (νc Tv )N
14 Data CLASSROOM PUBLIC login {st} login {st} a {st} conncetion {pr} a {st} connection {st} p@λ R p@λ R R-scripted process p-path p@λ-pointer run, read, change dynamic changes of access rights
15 Data CLASSROOM PUBLIC login {st} login {st} a {st} conncetion {pr} a {st} connection {st} p@λ R p@λ R R-scripted process p-path p@λ-pointer run, read, change dynamic changes of access rights
16 Processes π-calculus P ::= 0 the nil process P P composition of processes c Tv v output value v on a channel c c Tv (x).p input parameterized by a variable x!c Tv (x).p replication of an input process
17 Processes π-calculus P ::= 0 the nil process P P composition of processes c Tv v output value v on a channel c c Tv (x).p input parameterized by a variable x!c Tv (x).p replication of an input process dπ-calculus P ::= go λ.r migrate to location λ, continue as R Xdπ-calculus P ::= run p run command read p(χ).p read command change p (χ, V ).P change command
18 Processes RXdπ-calculus P ::= enable(r) p.p gives permission to the role r to access data on the path p disable(r) p.p removes the role rfrom roles that are allowed to access data on the path p R ::= P ρ single process with roles ρ R R parallel composition of processes with roles (νc Tv )R restriction of channel name c
19 Interactions in the System Communication Movement Interaction with local data Permission change Reduction rules formally describe interactions in the system.
20 Interactions in the System Communication l T P ρ Q σ Movement Interaction with local data Permission change Reduction rules formally describe interactions in the system.
21 Interactions in the System Communication Movement l m T P ρ T Q σ Interaction with local data Permission change Reduction rules formally describe interactions in the system.
22 Interactions in the System Communication Movement Interaction with local data l T P ρ Permission change Reduction rules formally describe interactions in the system.
23 Interactions in the System Communication Movement Interaction with local data Permission change l T P ρ Reduction rules formally describe interactions in the system.
24 Operational Semantics - Example a α b c ρ b β dγ (read a α (y (σ,e,d) ).change a α (y (β) 1.go x.enable(r) y ρ ) (σ,e,d), R) 1 l
25 Operational Semantics - Example a α b c ρ b β dγ (read a α (y (σ,e,d) ).change a α (y (β) 1.go x.enable(r) y ρ ) (σ,e,d), R) 1 l
26 Operational Semantics - Example a α b c ρ b β dγ (change a α (y (β) (σ,e,d), R).go l.enable(r) 1 b β ρ ) ρ l
27 Operational Semantics - Example a α b c ρ b β dγ (change a α (y (β) (σ,e,d), R).go l.enable(r) β 1 b ρ ) ρ l
28 Operational Semantics - Example R a α c ρ b β dγ (go l.enable(r) b β ρ ) ρ l
29 Operational Semantics - Example R a α c ρ b β dγ (go l.enable(r) b β ρ ) ρ l
30 Operational Semantics - Example R a α c ρ b β dγ enable(r) b β ρ l
31 Operational Semantics - Example R a α c ρ b β dγ enable(r) b β ρ l
32 Operational Semantics - Example R a α c ρ b β dγ {r} l
33 Outline 1 Motivation Related Work Access control - RXdπ-calculus 2 RXdπ-calculus Syntax Semantics 3 Types Types Safety
34 Type System Main goals to control communication of values to control migration and activation of processes to control access to data and their modification Location Policy (σ, E, D) σ: set of minimal roles which can access data E: policy for role enabling D: policy for role disabling
35 Type System Main goals to control communication of values to control migration and activation of processes to control access to data and their modification Location Policy (σ, E, D) σ: set of minimal roles which can access data E: policy for role enabling D: policy for role disabling
36 Type System - Example st st i as prof dean where i I.
37 Type System - Example st st i as prof dean where i I. FACULTY : (σ F, E F, D F ) σ F = {st i } E F = ({prof}, as) D C = ({dean}, st i ) FACULTY
38 Type System - Example st st i as prof dean where i I. FACULTY : (σ F, E F, D F ) σ F = {st i } E F = ({prof}, as) D C = ({dean}, st i ) FACULTY service {st i} records {pr} booklet {st i} mark mark
39 Type System - Example st st i as prof dean where i I. FACULTY : (σ F, E F, D F ) σ F = {st i } E F = ({prof}, as) D C = ({dean}, st i ) FACULTY service {st i} records {pr} booklet {st i} enable(as) service pr pr mark mark
40 Type System - Example st st i as prof dean where i I. FACULTY : (σ F, E F, D F ) σ F = {st i } E F = ({prof}, as) D C = ({dean}, st i ) FACULTY service {st i} records {pr} booklet {st i} disable(st i ) service pr dean mark mark
41 Type System - Example st st i as prof dean where i I. FACULTY : (σ F, E F, D F ) σ F = {st i } E F = ({prof}, as) D C = ({dean}, st i ) FACULTY service {st i} records {pr} booklet {st i} enable(st i ) service pr pr mark mark
42 Safety properties (Subject reduction) If N : Net and N N, then N : Net. Properties of location policies and communication: P0 All trees and processes in a location agree with the location policy; P1 A process with roles can communicate only values with characteristic roles accessible to the process. Properties of migration between locations: P2 A process with roles can migrate to another location only if it is well typed for that location. Properties of access of processes to local data trees: P3 A process with roles looks for a path in the local tree only if the path is accessible to the process.
43 Safety properties Properties of manipulation of local data trees by processes: P4 A script is activated in a location only if the corresponding process with roles can stay in that location; P5 A process with roles generated by a read command in a location can stay in that location; P6 A process with roles can erase a subtree of data only if it can access all data; P7 A tree built by a change command in a location can stay in that location; P8 A process with roles can add a role to an edge in the local tree only if this is allowed by the location policy; P9 A tree built by an enable command in a location can stay in that location; P10 A process with roles can erase a role from an edge in the local tree only if this is allowed by the location policy; P11 A tree built by a disable command in a location can stay in that location.
44 May 29 to June 3, 2011 Novi Sad, Serbia RDP 2011 Announcement
A Distributed Calculus for Role-Based Access Control
A Distributed Calculus for Role-Based Access Control Chiara Braghin joint work with D. Gorla and V. Sassone MyThS Meeting, Venice, June, 14th, 2004 A Distributed Calculus for Role-Based Access Control
Dynamic Process/Service Composition/Combination
INFINT 2009 - Bertinoro Workshop on Data and Service Integration Bertinoro, March 15-20, 2009 Dynamic Process/Service Composition/Combination Ugo Montanari Dipartimento di Informatica Università di Pisa
File Server Migration
2 June 2014, HAPPIEST MINDS TECHNOLOGIES File Server Migration Author Suresh Elumalai SHARING. MINDFUL. INTEGRITY. LEARNING. EXCELLENCE. SOCIAL RESPONSIBILITY. Copyright Information This document is an
SQL Server Training Course Content
SQL Server Training Course Content SQL Server Training Objectives Installing Microsoft SQL Server Upgrading to SQL Server Management Studio Monitoring the Database Server Database and Index Maintenance
How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip
Load testing with WAPT: Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. A brief insight is provided
ABET General Outcomes. Student Learning Outcomes for BS in Computing
ABET General a. An ability to apply knowledge of computing and mathematics appropriate to the program s student outcomes and to the discipline b. An ability to analyze a problem, and identify and define
340368 - FOPR-I1O23 - Fundamentals of Programming
Coordinating unit: 340 - EPSEVG - Vilanova i la Geltrú School of Engineering Teaching unit: 723 - CS - Department of Computer Science Academic year: Degree: 2015 BACHELOR'S DEGREE IN INFORMATICS ENGINEERING
Introducing Formal Methods. Software Engineering and Formal Methods
Introducing Formal Methods Formal Methods for Software Specification and Analysis: An Overview 1 Software Engineering and Formal Methods Every Software engineering methodology is based on a recommended
CURRICULUM VITAE EDUCATION:
CURRICULUM VITAE Jose Antonio Lozano Computer Science and Software Development / Game and Simulation Programming Program Chair 1902 N. Loop 499 Harlingen, TX 78550 Computer Sciences Building Office Phone:
Principles of Distributed Database Systems
M. Tamer Özsu Patrick Valduriez Principles of Distributed Database Systems Third Edition
HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION
HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION Version 1.1 / Last updated November 2012 INTRODUCTION The Cloud Link for Windows client software is packaged as an MSI (Microsoft Installer)
Big Data Development CASSANDRA NoSQL Training - Workshop. March 13 to 17-2016 9 am to 5 pm HOTEL DUBAI GRAND DUBAI
Big Data Development CASSANDRA NoSQL Training - Workshop March 13 to 17-2016 9 am to 5 pm HOTEL DUBAI GRAND DUBAI ISIDUS TECH TEAM FZE PO Box 121109 Dubai UAE, email training-coordinator@isidusnet M: +97150
SAP BusinessObjects Business Intelligence (BI) platform Document Version: 4.1, Support Package 3-2014-04-03. Report Conversion Tool Guide
SAP BusinessObjects Business Intelligence (BI) platform Document Version: 4.1, Support Package 3-2014-04-03 Table of Contents 1 Report Conversion Tool Overview.... 4 1.1 What is the Report Conversion Tool?...4
AnzioWin FTP Dialog. AnzioWin version 15.0 and later
AnzioWin FTP Dialog AnzioWin version 15.0 and later With AnzioWin version 15.0, we have included an enhanced interactive FTP dialog that operates similar to Windows Explorer. The FTP dialog, shown below,
Novell ZENworks 10 Configuration Management SP3
AUTHORIZED DOCUMENTATION Software Distribution Reference Novell ZENworks 10 Configuration Management SP3 10.3 November 17, 2011 www.novell.com Legal Notices Novell, Inc., makes no representations or warranties
EVENT VIEWER IN WINDOWS 7
EVENT VIEWER IN WINDOWS 7 Event Viewer We can open Event Viewer in different ways, such as trough Computer Management and Administrative Tools. However, the easiest way is to type "eventvwr" in search
IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM
IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015 Integration Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 93.
A Workbench for Prototyping XML Data Exchange (extended abstract)
A Workbench for Prototyping XML Data Exchange (extended abstract) Renzo Orsini and Augusto Celentano Università Ca Foscari di Venezia, Dipartimento di Informatica via Torino 155, 30172 Mestre (VE), Italy
The following was taken directly from the ARD (Apple Remote Desktop) operator s manual:
The following was taken directly from the ARD (Apple Remote Desktop) operator s manual: Copying Files Apple Remote Desktop makes it easy to update items on one or more client computers. Copying files works
BackupAgent LabTech Integration Installation and Usage
BackupAgent LabTech Integration Installation and Usage Overview This integration was designed and developed to provide a deployment and monitoring solution for BackupAgent within the LabTech Control Center.
Techniques and Tools for Rich Internet Applications Testing
Techniques and Tools for Rich Internet Applications Testing Domenico Amalfitano Anna Rita Fasolino Porfirio Tramontana Dipartimento di Informatica e Sistemistica University of Naples Federico II, Italy
Software Life-Cycle Management
Ingo Arnold Department Computer Science University of Basel Theory Software Life-Cycle Management Architecture Styles Overview An Architecture Style expresses a fundamental structural organization schema
Representation of E-documents in AIDA Project
Representation of E-documents in AIDA Project Diana Berbecaru Marius Marian Dip. di Automatica e Informatica Politecnico di Torino Corso Duca degli Abruzzi 24, 10129 Torino, Italy Abstract Initially developed
Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol
Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Andraž Jere, Marko Meža, Boštjan Marušič, Štefan Dobravec, Tomaž Finkšt, Jurij F. Tasič Faculty of Electrical Engineering Tržaška
Using Peer to Peer Dynamic Querying in Grid Information Services
Using Peer to Peer Dynamic Querying in Grid Information Services Domenico Talia and Paolo Trunfio DEIS University of Calabria HPC 2008 July 2, 2008 Cetraro, Italy Using P2P for Large scale Grid Information
HP TeamSite Developer - Training Agenda
HP TeamSite Developer - Training Agenda Course Outline This course covers the skills and knowledge needed for students to be able to use TeamSite to create and edit content, use FormsPublisher forms and
EXTRA. Vulnerability scanners are indispensable both VULNERABILITY SCANNER
Vulnerability scanners are indispensable both for vulnerability assessments and penetration tests. One of the first things a tester does when faced with a network is fire up a network scanner or even several
Course Design Document: IS412: Enterprise Business Solutions Enterprise Process Integration using SAP Software. Version 1.6
Course Design Document: IS412: Enterprise Business Solutions Enterprise Process Integration using SAP Software Version 1.6 16 th June 2010 Table of Content 1. Versions History...4 2. Overview of the Enterprise
SelectSurvey.NET IT Staff Training
SelectSurvey.NET IT Staff Training 3 hour course Written for V4.100.001 11/2013 Page 1 of 12 SelectSurvey.NET IT Staff Training In this video course, students will learn all of the basic functionality
Methodological Approaches to Evaluation of Information System Functionality Performances and Importance of Successfulness Factors Analysis
Gordana Platiša Neđo Balaban Methodological Approaches to Evaluation of Information System Functionality Performances and Importance of Successfulness Factors Analysis Article Info:, Vol. 4 (2009), No.
Software Verification and Testing. Lecture Notes: Temporal Logics
Software Verification and Testing Lecture Notes: Temporal Logics Motivation traditional programs (whether terminating or non-terminating) can be modelled as relations are analysed wrt their input/output
StaRVOOrS: A Tool for Combined Static and Runtime Verification of Java
StaRVOOrS: A Tool for Combined Static and Runtime Verification of Java Jesús Mauricio Chimento 1, Wolfgang Ahrendt 1, Gordon J. Pace 2, and Gerardo Schneider 3 1 Chalmers University of Technology, Sweden.
BCKPLBO. 2007... Logivision
BCKPLBO BCKPLBO by Logivision Logivision is a corporation specialized in the development of software for the retail industry with a particular focus on operation systems for front-end terminals. Innovative
Optimizing Business Continuity Management with NetIQ PlateSpin Protect and AppManager. Best Practices and Reference Architecture
Optimizing Business Continuity Management with NetIQ PlateSpin Protect and AppManager Best Practices and Reference Architecture WHITE PAPER Table of Contents Introduction.... 1 Why monitor PlateSpin Protect
Directory-enabled Lights-Out Management
Directory-enabled Lights-Out Management white paper Abstract... 2 Remote management products... 2 Business needs... 3 Customer environment... 3 Benefits... 3 Directory architecture... 4 Overview... 4 Objects...
Analyzing Network Servers. Disk Space Utilization Analysis. DiskBoss - Data Management Solution
DiskBoss - Data Management Solution DiskBoss provides a large number of advanced data management and analysis operations including disk space usage analysis, file search, file classification and policy-based
System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks
System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks OnurSoft Onur Tolga Şehitoğlu November 10, 2012 v1.0 Contents 1 Introduction 3 1.1 Purpose..............................
Expanding the CASEsim Framework to Facilitate Load Balancing of Social Network Simulations
Expanding the CASEsim Framework to Facilitate Load Balancing of Social Network Simulations Amara Keller, Martin Kelly, Aaron Todd 4 June 2010 Abstract This research has two components, both involving the
CryptographicallyEnforced
Cryptographically CryptographicallyEnforced Enforced RBAC RBAC Georg Fuchsbauer (IST Austria) 27 June 2013, CSF joint work with Anna Lisa Ferrara and Bogdan Warinschi (University of Bristol) Overview Cryptographically
Analysis report examination with CUBE
Analysis report examination with CUBE Brian Wylie Jülich Supercomputing Centre CUBE Parallel program analysis report exploration tools Libraries for XML report reading & writing Algebra utilities for report
XP24000/XP20000 Performance Monitor User Guide
HP StorageWorks XP24000/XP20000 Performance Monitor User Guide Abstract This user's guide describes and provides instructions for using the Performance Monitor software. Part Number: T5214-96088 Eleventh
Crystal Converter User Guide
Crystal Converter User Guide Crystal Converter v2.5 Overview The Crystal Converter will take a report that was developed in Crystal Reports 11 or lower and convert the supported features of the report
Log Management and Intrusion Detection
Log Management and Intrusion Detection Dr. Guillermo Francia,, III Jacksonville State University Prerequisites Understand Event Logs Understand Signs of Intrusion Know the Tools Log Parser (Microsoft)
CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing
CS Master Level Courses and Areas The graduate courses offered may change over time, in response to new developments in computer science and the interests of faculty and students; the list of graduate
IBM: Using Queue Replication
coursemonster.com/uk IBM: Using Queue Replication View training dates» Overview Gain knowledge on InfoSphere Replication Server and how it is used to perform both queue-based homogeneous data replication
1 crossover cable. the PCs. network
King Abdul-Aziz University Faculty of Computing and Information Technology Department of Information Technology Computer Networks CPIT370 Lab#2: Wired Peer to Peer network and star topology using a switch
SOE. managing change in system development projects: configuration management
SOE managing change in system development projects: configuration management 2 3 understanding the problem of change change is one of the most fundamental characteristics in any software development process
Forms Printer User Guide
Forms Printer User Guide Version 10.51 for Dynamics GP 10 Forms Printer Build Version: 10.51.102 System Requirements Microsoft Dynamics GP 10 SP2 or greater Microsoft SQL Server 2005 or Higher Reporting
Novell Distributed File Services Administration Guide
www.novell.com/documentation Novell Distributed File Services Administration Guide Open Enterprise Server 11 SP2 January 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect
Forefront Client Security. Ronald Beekelaar Beekelaar Consultancy [email protected]
Forefront Client Security Ronald Beekelaar Beekelaar Consultancy [email protected] Introductions Presenter Ronald Beekelaar MVP Windows Security MVP Virtual Machine Technology E-mail: [email protected]
N02-IBM Managed File Transfer Technical Mastery Test v1
N02-IBM Managed File Transfer Technical Mastery Test v1 Number: 000-N02 Passing Score: 750 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ The IBM/Sterling Managed File Transfer Suite
OFBiz Addons goals, howto use, howto manage. Nicolas Malin, Nov. 2012
OFBiz Addons goals, howto use, howto manage Nicolas Malin, Nov. 2012 Agenda History of a birth Addons principle Addons and their environment (extensive program) Conclusion Once upon a time The history
COMPUTER SCIENCE AND ENGINEERING
The University of Connecticut School of Engineering COMPUTER SCIENCE AND ENGINEERING GUIDE TO COURSE SELECTION AY 2013-2014 Revised May 23, 2013 for Computer Science and Engineering (CSE) Majors in the
Databases 2011 The Relational Model and SQL
Databases 2011 Christian S. Jensen Computer Science, Aarhus University What is a Database? Main Entry: da ta base Pronunciation: \ˈdā-tə-ˌbās, ˈda- also ˈdä-\ Function: noun Date: circa 1962 : a usually
RT Support Ticket System
Table of Contents RT Self Service Panel Login... 1 Creating a New Ticket... 1 Reviewing the Ticket... 3 Reading a Thread... 3 Resolving a Ticket... 4 Re-opening a Ticket... 4 Note: At the time of purchase,
Access Control and Audit Trail Software
Varian, Inc. 2700 Mitchell Drive Walnut Creek, CA 94598-1675/USA Access Control and Audit Trail Software Operation Manual Varian, Inc. 2002 03-914941-00:3 Table of Contents Introduction... 1 Access Control
SMock A Test Platform for the Evaluation of Monitoring Tools
SMock A Test Platform for the Evaluation of Monitoring Tools User Manual Ruth Mizzi Faculty of ICT University of Malta June 20, 2013 Contents 1 Introduction 3 1.1 The Architecture and Design of SMock................
Citrix EdgeSight for Load Testing User s Guide. Citrx EdgeSight for Load Testing 2.7
Citrix EdgeSight for Load Testing User s Guide Citrx EdgeSight for Load Testing 2.7 Copyright Use of the product documented in this guide is subject to your prior acceptance of the End User License Agreement.
Roberto Barbera. Centralized bookkeeping and monitoring in ALICE
Centralized bookkeeping and monitoring in ALICE CHEP INFN 2000, GRID 10.02.2000 WP6, 24.07.2001 Roberto 1 Barbera ALICE and the GRID Phase I: AliRoot production The GRID Powered by ROOT 2 How did we get
INTEGRATION OF XML DATA IN PEER-TO-PEER E-COMMERCE APPLICATIONS
INTEGRATION OF XML DATA IN PEER-TO-PEER E-COMMERCE APPLICATIONS Tadeusz Pankowski 1,2 1 Institute of Control and Information Engineering Poznan University of Technology Pl. M.S.-Curie 5, 60-965 Poznan
Survey on Load Rebalancing for Distributed File System in Cloud
Survey on Load Rebalancing for Distributed File System in Cloud Prof. Pranalini S. Ketkar Ankita Bhimrao Patkure IT Department, DCOER, PG Scholar, Computer Department DCOER, Pune University Pune university
STRATEGIES ON SOFTWARE INTEGRATION
STRATEGIES ON SOFTWARE INTEGRATION Cornelia Paulina Botezatu and George Căruţaşu Faculty of Computer Science for Business Management Romanian-American University, Bucharest, Romania ABSTRACT The strategy
Unicenter Desktop DNA r11
Data Sheet Unicenter Desktop DNA r11 Unicenter Desktop DNA is a scalable migration solution for the management, movement and maintenance of a PC s DNA (including user settings, preferences and data.) A
Performance Evaluation of Natural and Surrogate Key Database Architectures
Performance Evaluation of Natural and Surrogate Key Database Architectures Sebastian Link 1, Ivan Luković 2, Pavle ogin *)1 1 Victoria University of Wellington, Wellington, P.O. Box 600, New Zealand [email protected]
SPHOL205: Introduction to Backup & Restore in SharePoint 2013. Hands-On Lab. Lab Manual
2013 SPHOL205: Introduction to Backup & Restore in SharePoint 2013 Hands-On Lab Lab Manual This document is provided as-is. Information and views expressed in this document, including URL and other Internet
Temporal Logics. Computation Tree Logic
Temporal Logics CTL: definition, relationship between operators, adequate sets, specifying properties, safety/liveness/fairness Modeling: sequential, concurrent systems; maximum parallelism/interleaving
Monitoring Networks through Multiparty Session Types
Monitoring Networks through Multiparty Session Types Laura Bocchi 1, Tzu-Chun Chen 2, Romain Demangeon 1, Kohei Honda 2, Nobuko Yoshida 1 2 Queen Mary, University of London, 1 Imperial College, London
A Visual Language Based System for the Efficient Management of the Software Development Process.
A Visual Language Based System for the Efficient Management of the Software Development Process. G. COSTAGLIOLA, G. POLESE, G. TORTORA and P. D AMBROSIO * Dipartimento di Informatica ed Applicazioni, Università
Semi-structured Data. 1 - Introduction
Semi-structured Data 1 - Introduction Andreas Pieris and Wolfgang Fischl, Summer Term 2016 Outline Structured Data Semi-structured Data Why Semi-structured Data? The Data Model Store Semi-structured Data
TIBCO Spotfire Server Migration. Migration Manual
TIBCO Spotfire Server Migration Migration Manual Revision date: 26 October 2012 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE
Proceedings of the International MultiConference of Engineers and Computer Scientists 2013 Vol I, IMECS 2013, March 13-15, 2013, Hong Kong
, March 13-15, 2013, Hong Kong Risk Assessment for Relational Database Schema-based Constraint Using Machine Diagram Kanjana Eiamsaard 1, Nakornthip Prompoon 2 Abstract Information is a critical asset
Avatier Identity Management Suite
Avatier Identity Management Suite Migrating AIMS Configuration and Audit Log Data To Microsoft SQL Server Version 9 2603 Camino Ramon Suite 110 San Ramon, CA 94583 Phone: 800-609-8610 925-217-5170 FAX:
Project 2: Firewall Design (Phase I)
Project 2: Firewall Design (Phase I) CS 161 - Joseph/Tygar November 12, 2006 1 Edits If we need to make clarifications or corrections to this document after distributing it, we will post a new version
ESB Features Comparison
ESB Features Comparison Feature wise comparison of Mule ESB & Fiorano ESB Table of Contents A note on Open Source Software (OSS) tools for SOA Implementations... 3 How Mule ESB compares with Fiorano ESB...
Objectives of Lecture 1. Labs and TAs. Class and Office Hours. CMPUT 391: Introduction. Introduction
Database Management Systems Winter 2003 CMPUT 391: Introduction Dr. Osmar R. Zaïane Objectives of Lecture 1 Introduction Get a rough initial idea about the content of the course: Lectures Resources Activities
IBM Endpoint Manager Version 9.1. Patch Management for Red Hat Enterprise Linux User's Guide
IBM Endpoint Manager Version 9.1 Patch Management for Red Hat Enterprise Linux User's Guide IBM Endpoint Manager Version 9.1 Patch Management for Red Hat Enterprise Linux User's Guide Note Before using
DIABLO VALLEY COLLEGE CATALOG 2014-2015
COMPUTER SCIENCE COMSC The computer science department offers courses in three general areas, each targeted to serve students with specific needs: 1. General education students seeking a computer literacy
GET STARTED WITH A SIMPLE, FAST AND COST EFFECTIVE ORACLE FUSION SALES CLOUD ADOPTION TODAY!
GET STARTED WITH A SIMPLE, FAST AND COST EFFECTIVE ORACLE FUSION SALES CLOUD ADOPTION TODAY! KEY FEATURES Pre-defined Processes Fully-functional Processes Reduced Costs Accelerated Timelines Fixed Deliverables
Clustering through Decision Tree Construction in Geology
Nonlinear Analysis: Modelling and Control, 2001, v. 6, No. 2, 29-41 Clustering through Decision Tree Construction in Geology Received: 22.10.2001 Accepted: 31.10.2001 A. Juozapavičius, V. Rapševičius Faculty
1. INTERFACE ENHANCEMENTS 2. REPORTING ENHANCEMENTS
W E L C O M E T O M O N I T O R I N G H E A V E N NEW THINGS ABOUT PANDORA FMS 5.0 A new version of Pandora FMS full of enhancements is about to hit the market. Pandora FMS 5.0 will be released by the
CONVERTING FROM NETKEEPER ISAM v6.32 to NETKEEPER SQL
Download and install the NetKeeper ISAM to SQL converter program. To download the Converter program go to: http://www.netkeeper.com/other/nkuser1.htm Scroll down the page until you find a link that says:
Upgrading to advanced editions of Acronis Backup & Recovery 10. Technical white paper
Upgrading to advanced editions of Acronis Backup & Recovery 10 Technical white paper Table of contents 1 Introduction...3 2 Choosing the way to upgrade...3 2.1 Gradual upgrade... 3 2.2 Importing backup
Overview. Stakes. Context. Model-Based Development of Safety-Critical Systems
1 2 Model-Based Development of -Critical Systems Miguel A. de Miguel 5/6,, 2006 modeling Stakes 3 Context 4 To increase the industrial competitiveness in the domain of software systems To face the growing
Peer-to-Peer Networks. Chapter 6: P2P Content Distribution
Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks
