{"title":"Advanced access control system for multi-tier server applications","authors":"Lubomir Cvrk, V. Vrba, Karol Molnar","doi":"10.1109/ICONS.2007.10","DOIUrl":"https://doi.org/10.1109/ICONS.2007.10","url":null,"abstract":"Server applications are one of the most important components of applications which use multi-tire architecture. These servers need to handle access of users. Access control logic is usually implemented directly inside an object which is responsible for performing required operations over the data. The object verifies access to its methods and permits or denies the operation. But systems usually consist of many such objects with different missions. All of these objects require similar access control system. This makes a greater overhead because access control verification must be coded inside all those objects. If in this approach a programmer forgets to verify some of required rights in the code then the system may encounter a forbidden data access. This article deals with that topic and designs a unified database layer working over relation databases. Benefits of this layer are strong simplification of the access control system and impossibility to access data without permissions.","PeriodicalId":355435,"journal":{"name":"Second International Conference on Systems (ICONS'07)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127400083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Space-Time Trade-offs in SW Evaluation of Boolean Functions","authors":"V. Dvorák","doi":"10.1109/ICONS.2007.51","DOIUrl":"https://doi.org/10.1109/ICONS.2007.51","url":null,"abstract":"Fast evaluation of multiple-output Boolean functions with the smallest memory footprint is often required in embedded systems. The paper describes a novel method of linked tables for representation and evaluation of Boolean functions and compares it with traditional methods; PLAs from the MCS-51 microcontroller are used for comparison. Traditional methods use masks to emulate PLA one way or another. The suggested method of linked tables is based on iterative disjunctive decomposition and leads only to a series of table look-ups. Linked tables are also shown to be equivalent to specific \"in-line\" decision diagrams. They proved to be most flexible in making trade-offs between performance and memory space. The method of linked tables may be quite useful for embedded microprocessor or microcontroller software as well as for digital system simulation.","PeriodicalId":355435,"journal":{"name":"Second International Conference on Systems (ICONS'07)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115125950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Lau, Heechang Kim, Bruce Siegell, Stephanie Demers
{"title":"Demand-Driven Prioritization for ACERT","authors":"R. Lau, Heechang Kim, Bruce Siegell, Stephanie Demers","doi":"10.1109/ICONS.2007.19","DOIUrl":"https://doi.org/10.1109/ICONS.2007.19","url":null,"abstract":"Cognitive Adaptive Radio Teams (CART) is a new platform developed by our group in support of collaborative data collection and dissemination in a radio- challenged setting. The target scenario is characterized by a harsh ad-hoc radio environment with many-to-many multicast applications. In this paper we proposed a special data structure called demand-driven prioritized data structure (DDPDS) that allows optimization of such data dissemination using cognitive wireless techniques.","PeriodicalId":355435,"journal":{"name":"Second International Conference on Systems (ICONS'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129879658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}