Sciweavers

670 search results - page 77 / 134
» A RBAC-Based Policy Information Base
Sort
View
CCS
2005
ACM
14 years 4 months ago
A framework for concrete reputation-systems with applications to history-based access control
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions...
Karl Krukow, Mogens Nielsen, Vladimiro Sassone
GLOBECOM
2006
IEEE
14 years 4 months ago
Optimum Ergodic Power Allocation for Multiuser OFDM with Arbitrary Signal Constellations
Abstract— This paper formulates the power allocation policy that maximizes the region of ergodic mutual informations achievable in multiuser downlink OFDM channels known only sta...
Angel Lozano, Antonia Maria Tulino, Sergio Verd&ua...
ESSOS
2010
Springer
14 years 7 months ago
Experiences with PDG-Based IFC
Information flow control systems provide the guarantees that are required in today’s security-relevant systems. While the literature has produced a wealth of techniques to ensur...
Christian Hammer
TOSEM
1998
80views more  TOSEM 1998»
13 years 10 months ago
Discovering Models of Software Processes from Event-Based Data
Many software process methods and tools presuppose the existence of a formal model of a process. Unfortunately, developing a formal model for an on-going, complex process can be d...
Jonathan E. Cook, Alexander L. Wolf
ICFP
2010
ACM
13 years 11 months ago
Security-typed programming within dependently typed programming
Several recent security-typed programming languages, such as Aura, PCML5, and Fine, allow programmers to express and enforce access control and information flow policies. Most of ...
Jamie Morgenstern, Daniel R. Licata