Sciweavers

366 search results - page 33 / 74
» Access Policy Design Supported by FCA Methods
Sort
View
SACMAT
2003
ACM
14 years 2 months ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
ACSAC
2004
IEEE
14 years 14 days ago
Designing Good Deceptions in Defense of Information Systems
Since attackers trust computer systems to tell them the truth, it may be effective for those systems to lie or mislead. This could waste the attacker's resources while permit...
Neil C. Rowe
CSMR
2000
IEEE
14 years 1 months ago
Design Properties and Object-Oriented Software Changeability
The assessment of the changeability of software systems is of major concern for buyers of the large systems found in fast-moving domains such as telecommunications. One way of app...
M. Ajmal Chaumun, Hind Kabaili, Rudolf K. Keller, ...
INFOCOM
2007
IEEE
14 years 3 months ago
Two-Tier Load Balancing in OSPF Wireless Back-Hauls
Abstract— High-speed wireless communication technology (e.g. WiMAX) makes it feasible and cost-effective to build wireless back-hauls for Internet access. Compared to wired count...
Xiaowen Zhang, Hao Zhu
CORR
2010
Springer
94views Education» more  CORR 2010»
13 years 8 months ago
Symmetric M-tree
The M-tree is a paged, dynamically balanced metric access method that responds gracefully to the insertion of new objects. To date, no algorithm has been published for the corresp...
Alan P. Sexton, Richard Swinbank