Sciweavers

670 search results - page 39 / 134
» A RBAC-Based Policy Information Base
Sort
View
TCS
2010
13 years 9 months ago
Arrows for secure information flow
This paper presents an embedded security sublanguage for enforcing informationflow policies in the standard Haskell programming language. The sublanguage provides useful informat...
Peng Li, Steve Zdancewic
SAC
2008
ACM
13 years 10 months ago
Web service security management using semantic web techniques
The importance of the Web service technology for business, government, among other sectors, is growing. Its use in these sectors demands security concern. The Web Services Securit...
Diego Zuquim Guimarães Garcia, Maria Beatri...
TMC
2010
126views more  TMC 2010»
13 years 9 months ago
Achievable Capacity in Hybrid DS-CDMA/OFDM Spectrum-Sharing
—In this paper, we consider DS-CDMA/OFDM spectrum sharing systems and obtain the achievable capacity of the secondary service under different subchannel selection policies in the...
Mohammad G. Khoshkholgh, Keivan Navaie, Halim Yani...
ECIS
2004
14 years 5 days ago
Hungarian IT: Coping with Economic Transition and Globalisation
This paper examines the impact of economic transition on the information technology industry in Hungary. It highlights some of the challenges faced by policy makers and businesses...
G. Harindranath
PVLDB
2008
132views more  PVLDB 2008»
13 years 10 months ago
Access control over uncertain data
Access control is the problem of regulating access to secret information based on certain context information. In traditional applications, context information is known exactly, p...
Vibhor Rastogi, Dan Suciu, Evan Welbourne