Sciweavers

670 search results - page 108 / 134
» A RBAC-Based Policy Information Base
Sort
View
SEMWEB
2004
Springer
14 years 3 months ago
Trust Negotiation for Semantic Web Services
Semantic Web Services enable the dynamic discovery of services based on a formal, explicit specification of the requester needs. The actual Web Services that will be used to satis...
Daniel Olmedilla, Rubén Lara, Axel Polleres...
ACSAC
2002
IEEE
14 years 3 months ago
Malicious Code Detection for Open Firmware
Malicious boot firmware is a largely unrecognized but significant security risk to our global information infrastructure. Since boot firmware executes before the operating syst...
Frank Adelstein, Matthew Stillerman, Dexter Kozen
ICC
2007
IEEE
143views Communications» more  ICC 2007»
14 years 4 months ago
A Stochastic Framework for Scheduling in Wireless Packet Access Networks
— We put forth a unified framework for downlink and uplink scheduling of multiple connections with diverse qualityof-service requirements, where each connection transmits using ...
Xin Wang, Georgios B. Giannakis
CCGRID
2006
IEEE
14 years 4 months ago
INTCTD: A Peer-to-Peer Approach for Intrusion Detection
In this paper we propose a peer-to-peer (P2P) prototype (INTCTD) for intrusion detection over an overlay network. INTCTD is a distributed system based on neural networks for detec...
Catalin Dumitrescu
IPPS
2003
IEEE
14 years 3 months ago
Better Real-Time Response for Time-Share Scheduling
As computing systems of all types grow in power and complexity, it is common to want to simultaneously execute processes with different timeliness constraints. Many systems use CP...
Scott A. Banachowski, Scott A. Brandt