Sciweavers

1472 search results - page 74 / 295
» Access control in virtual environments
Sort
View
138
Voted
SACMAT
2009
ACM
15 years 11 months ago
Working set-based access control for network file systems
Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal hom...
Stephen Smaldone, Vinod Ganapathy, Liviu Iftode
SACMAT
2009
ACM
15 years 11 months ago
Dynamic mandatory access control for multiple stakeholders
In this paper, we present a mandatory access control system that uses input from multiple stakeholders to compose policies based on runtime information. In the emerging ubiquitous...
Vikhyath Rao, Trent Jaeger
ICDE
2007
IEEE
142views Database» more  ICDE 2007»
15 years 11 months ago
Database Virtualization: A New Frontier for Database Tuning and Physical Design
Resource virtualization is currently being employed at all levels of the IT infrastructure to improve provisioning and manageability, with the goal of reducing total cost of owner...
Ahmed A. Soror, Ashraf Aboulnaga, Kenneth Salem
ICISS
2009
Springer
15 years 2 months ago
BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs
Abstract. Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual...
Vanessa Frías-Martínez, Salvatore J....
132
Voted
CCS
2007
ACM
15 years 10 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...