Sciweavers

2009 search results - page 53 / 402
» A privacy-aware access control system
Sort
View
ICC
2007
IEEE
146views Communications» more  ICC 2007»
14 years 4 months ago
Media Access Control with Spatial Correlation for MIMO Ad Hoc Networks
– MIMO (Multiple Input Multiple Output) is capable of offering several-fold increase in spectral efficiency over singleantenna systems through spatial processing. However, curren...
Bing Wen Ke, Ying Jun Zhang, Soung Chang Liew
NDSS
2003
IEEE
14 years 3 months ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet
ICFP
2006
ACM
14 years 10 months ago
Access control in a core calculus of dependency
The Dependency Core Calculus (DCC) is an extension of the computational lambda calculus that was designed in order to capture the notion of dependency that arises in information-f...
Martín Abadi
SIGCOMM
2009
ACM
14 years 4 months ago
Resonance: dynamic access control for enterprise networks
Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and sys...
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, Ru...
SACMAT
2009
ACM
14 years 4 months ago
Trojan horse resistant discretionary access control
Modern operating systems primarily use Discretionary Access Control (DAC) to protect files and other operating system resources. DAC mechanisms are more user-friendly than Mandat...
Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang