The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Traditional financial trading systems were developed in database-based standalone model years ago. Given that there exist some evident drawbacks like high latency and low availability in such architecture, it is imperative to design a new model which can meet the requirements of time-sensitive financial transactions. Therefore, in this paper we design and implement a state-replication based matching...
Understanding business processes is an important step for software maintenance. The approaches for recovering business processes are mostly based on source code analysis, including static analysis and dynamic analysis. All these methods are proved to be effective in some specific situations. However, they are challenged when facing enterprise legacy systems which implement complex business processes...
Understanding a system from architecture view is very important for varieties of reasons. After frequent modifications, the system documents become outdated since they are inconsistent with the behaviors of the system. Currently, many component identification processes have been provided - clustering analysis, matrix analysis, graph-based decomposing methods, etc. - to understand the system design...
Access control is always essential for safe and security access to the system resource. Role based access control (RBAC) model is widely used in large enterprise software systems. The quality of the RBAC policy design especially role definition has great impact on the system security policy implementation. In this paper we propose a novel role engineering methods with security KAOS (SKAOS), which...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.