Sciweavers

706 search results - page 83 / 142
» Access Control: Policies, Models, and Mechanisms
Sort
View
EUC
2008
Springer
13 years 10 months ago
Privacy Engine for Context-Aware Enterprise Application Services
Satisfying the varied privacy preferences of individuals, while exposing context data to authorized applications and individuals, remains a major challenge for context-aware compu...
Marion Blount, John Davis, Maria Ebling, William F...
IEEEPACT
2009
IEEE
14 years 3 months ago
Soft-OLP: Improving Hardware Cache Performance through Software-Controlled Object-Level Partitioning
—Performance degradation of memory-intensive programs caused by the LRU policy’s inability to handle weaklocality data accesses in the last level cache is increasingly serious ...
Qingda Lu, Jiang Lin, Xiaoning Ding, Zhao Zhang, X...
LCN
2007
IEEE
14 years 3 months ago
Performance Analysis of Single Cell IEEE 802.16e Wireless MAN
—The IEEE 802.16 standard (commonly known as WiMAX), which has emerged as a broadband wireless access technology, is capable of delivering very high data rates. The grant/request...
Thierry Peyre, Rachid El Azouzi
MOBICOM
2004
ACM
14 years 2 months ago
PAVAN: a policy framework for content availabilty in vehicular ad-hoc networks
Advances in wireless communication, storage and processing are realizing next-generation in-vehicle entertainment systems. Even if hundreds of different video or audio titles are...
Shahram Ghandeharizadeh, Shyam Kapadia, Bhaskar Kr...
IEEEARES
2010
IEEE
14 years 3 months ago
Solving the Transitive Access Problem for the Services Oriented Architecture
: © Solving the Transitive Access Problem for the Services Oriented Architecture Alan H. Karp, Jun Li HP Laboratories HPL-2008-204R1 SOA, web services, access control, RBAC, PBAC,...
Alan H. Karp, Jun Li