Sciweavers

1140 search results - page 99 / 228
» A Purpose-Based Access Control Model
Sort
View
POLICY
2007
Springer
15 years 8 months ago
Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall
We present a discretionary access control framework that can be used to control a principal’s ability to link information from two or more audit records and compromise a user’...
Apu Kapadia, Prasad Naldurg, Roy H. Campbell
112
Voted
ICCD
2007
IEEE
99views Hardware» more  ICCD 2007»
15 years 6 months ago
Power reduction of chip multi-processors using shared resource control cooperating with DVFS
This paper presents a novel power reduction method for chip multi-processors (CMPs) under real-time constraints. While the power consumption of processing units (PUs) on CMPs can ...
Ryo Watanabe, Masaaki Kondo, Hiroshi Nakamura, Tak...
147
Voted
TCOM
2010
144views more  TCOM 2010»
15 years 1 months ago
Transmission Radius Control in Wireless Ad Hoc Networks with Smart Antennas
—In this paper, we present a model to analyze the performance of three transmission strategies with smart antennas, i.e. directional antennas with adjustable transmission power. ...
Fei Huang, Ka-Cheong Leung, Victor O. K. Li
113
Voted
ESORICS
2007
Springer
15 years 8 months ago
Obligations and Their Interaction with Programs
Obligations are pervasive in modern systems, often linked to access control decisions. We present a very general model of obligations as objects with state, and discuss its interac...
Daniel J. Dougherty, Kathi Fisler, Shriram Krishna...
129
Voted
ECRTS
2007
IEEE
15 years 9 months ago
Composition Techniques for Tree Communication Schedules
A critical resource in a distributed real-time system is its shared communication medium. Unrestrained concurrent access to the network can lead to collisions that reduce the syst...
Madhukar Anand, Sebastian Fischmeister, Insup Lee