Sciweavers

224 search results - page 4 / 45
» A General Methodology For The Development Of An Effective In...
Sort
View
JSAC
2007
77views more  JSAC 2007»
13 years 6 months ago
Generalized wavelength sharing policies for absolute QoS guarantees in OBS networks
— We consider the problem of supporting absolute QoS guarantees in terms of the end-to-end burst loss in OBS networks. We present a parameterized model for wavelength sharing whi...
Li Yang, George N. Rouskas
IFIP
2009
Springer
14 years 1 months ago
A Policy Model for Secure Information Flow
When a computer program requires legitimate access to confidential data, the question arises whether such a program may illegally reveal sensitive information. This paper proposes...
Adedayo Adetoye, Atta Badii
ICCS
2001
Springer
13 years 11 months ago
The Policy Machine for Security Policy Management
Abstract. Many different access control policies and models have been developed to suit a variety of goals; these include Role-Based Access Control, One-directional Information Flo...
Vincent C. Hu, Deborah A. Frincke, David F. Ferrai...
SIGSOFT
2008
ACM
14 years 7 months ago
Effective blame for information-flow violations
Programs trusted with secure information should not release that information in ways contrary to system policy. However, when a program contains an illegal flow of information, cu...
Dave King 0002, Trent Jaeger, Somesh Jha, Sanjit A...
SOUPS
2010
ACM
13 years 10 months ago
Optimizing a policy authoring framework for security and privacy policies
Policies which address security and privacy are pervasive parts of both technical and social systems, and technology to enable both organizations and individuals to create and man...
Maritza Johnson, John Karat, Clare-Marie Karat, Ke...