Sciweavers

670 search results - page 114 / 134
» A RBAC-Based Policy Information Base
Sort
View
CDC
2009
IEEE
118views Control Systems» more  CDC 2009»
14 years 3 months ago
Opportunistic scheduling in cellular systems in the presence of non-cooperative mobiles
Abstract— A central scheduling problem in wireless communications is that of allocating resources to one of many mobile stations that have a common radio channel. Much attention ...
Kavitha Veeraruna, Eitan Altman, Rachid El Azouzi,...
VLDB
2007
ACM
295views Database» more  VLDB 2007»
14 years 4 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
CADE
2008
Springer
14 years 10 months ago
Precise Dynamic Verification of Confidentiality
Confidentiality is maybe the most popular security property to be formally or informally verified. Noninterference is a baseline security policy to formalize confidentiality of sec...
Gurvan Le Guernic
CHI
2010
ACM
14 years 5 months ago
Communicating software agreement content using narrative pictograms
This paper presents narrative pictograms, diagrams designed to convey the abstract concepts of a software agreement. Narrative pictograms arose out of a need to increase the chanc...
Matthew Kay, Michael Terry
PCI
2005
Springer
14 years 3 months ago
A Graphical Rule Authoring Tool for Defeasible Reasoning in the Semantic Web
Defeasible reasoning is a rule-based approach for efficient reasoning with incomplete and inconsistent information. Such reasoning is useful for many applications in the Semantic W...
Nick Bassiliades, Efstratios Kontopoulos, Grigoris...