Sciweavers

670 search results - page 50 / 134
» A RBAC-Based Policy Information Base
Sort
View
TCOM
2008
136views more  TCOM 2008»
13 years 10 months ago
Cross-layer adaptive transmission with incomplete system state information
We consider a point-to-point communication system in which data packets randomly arrive to a finite-length buffer and are subsequently transmitted to a receiver over a timevarying ...
Anh Tuan Hoang, Mehul Motani
ACMICEC
2008
ACM
262views ECommerce» more  ACMICEC 2008»
14 years 23 days ago
Preventing information leakage between collaborating organisations
Information sharing and protection against leakage is a critical problem especially for organisations having sensitive information. Sharing content between individuals in the same...
Muntaha Alawneh, Imad M. Abbadi
CF
2011
ACM
12 years 10 months ago
SIFT: a low-overhead dynamic information flow tracking architecture for SMT processors
Dynamic Information Flow Tracking (DIFT) is a powerful technique that can protect unmodified binaries from a broad range of vulnerabilities such as buffer overflow and code inj...
Meltem Ozsoy, Dmitry Ponomarev, Nael B. Abu-Ghazal...
TC
1998
14 years 3 days ago
Propagating Integrity Information among Interrelated Databases
Data integrity policies often require that quality and integrity metadata be generated and communicated to potential users. However, in data warehouses, federations, and other mul...
Arnon Rosenthal, Edward Sciore
POLICY
2001
Springer
14 years 3 months ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...