Sciweavers

211 search results - page 16 / 43
» A Compositional Multiple Policies Operating System Security ...
Sort
View
122
Voted
CSFW
2006
IEEE
15 years 8 months ago
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies
There is a growing interest in establishing rules to regulate the privacy of citizens in the treatment of sensitive personal data such as medical and financial records. Such rule...
Michael J. May, Carl A. Gunter, Insup Lee
146
Voted
OTM
2005
Springer
15 years 8 months ago
Document Flow Model: A Formal Notation for Modelling Asynchronous Web Services Composition
This paper presents a formal notation for modelling asynchronous web services composition, using context and coordination mechanisms. Our notation specifies the messages that can b...
Jingtao Yang, Corina Cîrstea, Peter Henderso...
130
Voted
INFOCOM
2003
IEEE
15 years 8 months ago
Optimal replacement policies for non-uniform cache objects with optional eviction
Abstract— Replacement policies for general caching applications and Web caching in particular have been discussed extensively in the literature. Many ad-hoc policies have been pr...
Omri Bahat, Armand M. Makowski
153
Voted
CORR
2002
Springer
188views Education» more  CORR 2002»
15 years 2 months ago
GridBank: A Grid Accounting Services Architecture (GASA) for Distributed Systems Sharing and Integration
Computational Grids are emerging as a new infrastructure for Internet-based parallel and distributed computing. They enable the sharing, exchange, discovery, and aggregation of re...
Alexander Barmouta, Rajkumar Buyya
197
Voted
POPL
2012
ACM
13 years 10 months ago
A language for automatically enforcing privacy policies
It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application’s beh...
Jean Yang, Kuat Yessenov, Armando Solar-Lezama