Sciweavers

1587 search results - page 271 / 318
» Access Control for Shared Resources
Sort
View
SIGMOD
2003
ACM
123views Database» more  SIGMOD 2003»
14 years 11 months ago
The hyperion project: from data integration to data coordination
We present an architecture and a set of challenges for peer database management systems. These systems team up to build a network of nodes (peers) that coordinate at run time most...
Marcelo Arenas, Vasiliki Kantere, Anastasios Kemen...
SP
2009
IEEE
155views Security Privacy» more  SP 2009»
14 years 5 months ago
A Logic of Secure Systems and its Application to Trusted Computing
We present a logic for reasoning about properties of secure systems. The logic is built around a concurrent programming language with constructs for modeling machines with shared ...
Anupam Datta, Jason Franklin, Deepak Garg, Dilsun ...
UM
2009
Springer
14 years 5 months ago
Evaluating Three Scrutability and Three Privacy User Privileges for a Scrutable User Modelling Infrastructure
This paper describes the evaluation of a Scrutable User Modelling Infrastructure. SUMI is intended to form a service to allow users to share their user models from social e-network...
Demetris Kyriacou, Hugh C. Davis, Thanassis Tiropa...
CSE
2008
IEEE
14 years 5 months ago
Energy Model for H2S Monitoring Wireless Sensor Network
Abstract— Several applications have been proposed for Wireless sensor networks. These include habitat monitoring, structural health monitoring, pipeline (gas, water, and oil) mon...
Xiaojuan Chao, Waltenegus Dargie, Lin Guan
ICC
2007
IEEE
113views Communications» more  ICC 2007»
14 years 5 months ago
Quantifying the Interference Gray Zone in Wireless Networks: A Measurement Study
—In wireless networks where communications are made over a shared medium, interference and collisions are the primary causes of packet drops. In multi-hop networks such as wirele...
Wonho Kim, Jeongkeun Lee, Taekyoung Kwon, Sung-Ju ...