Sciweavers

670 search results - page 86 / 134
» A RBAC-Based Policy Information Base
Sort
View
WAC
2005
Springer
123views Communications» more  WAC 2005»
14 years 3 months ago
Service Evolution in a Nomadic Wireless Environment
Abstract. In this paper, we present and analyze a framework for selfevolving autonomic services in a wireless nomadic environment. We present a disconnected network architecture, w...
Iacopo Carreras, Francesco De Pellegrini, Daniele ...
IJPP
2010
156views more  IJPP 2010»
13 years 7 months ago
ForestGOMP: An Efficient OpenMP Environment for NUMA Architectures
Exploiting the full computational power of current hierarchical multiprocessor machines requires a very careful distribution of threads and data among the underlying non-uniform ar...
François Broquedis, Nathalie Furmento, Bric...
NETCOOP
2007
Springer
14 years 4 months ago
Grid Brokering for Batch Allocation Using Indexes
Abstract. In this paper we show how dynamic brokering for batch allocation in grids based on bi-dimensional indices can be used in practice in computational grids, with or without ...
Vandy Berten, Bruno Gaujal
ICISS
2005
Springer
14 years 3 months ago
Protection of Relationships in XML Documents with the XML-BB Model
Since XML tends to become the main format to exchange data over the Internet, it is necessary to define a security model to control the access to the content of these documents. S...
Frédéric Cuppens, Nora Cuppens-Boula...
WPES
2003
ACM
14 years 3 months ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...