Sciweavers

534 search results - page 14 / 107
» Aggregating and Deploying Network Access Control Policies
Sort
View
TWC
2011
256views more  TWC 2011»
13 years 2 months ago
Contextual Communications Congestion Control for Cooperative Vehicular Networks
—The wide scale deployment of cooperative vehicular ad-hoc networks will require the design of efficient congestion control policies that guarantee stable and reliable communica...
Miguel Sepulcre, Javier Gozálvez, Jé...
SELMAS
2004
Springer
14 years 21 days ago
Adaptive Access Control in Coordination-Based Mobile Agent Systems
The increased pervasiveness of mobile devices like cell phones, PDAs, and laptops draws attention to the need for coordination among these networked devices. The very nature of the...
Christine Julien, Jamie Payton, Gruia-Catalin Roma...
ICDM
2007
IEEE
135views Data Mining» more  ICDM 2007»
14 years 1 months ago
Private Inference Control for Aggregate Database Queries
Data security is a critical issue for many organizations. Sensitive data must be protected from both inside and outside attackers. Access control policies and related mechanisms h...
Geetha Jagannathan, Rebecca N. Wright
EUROSYS
2010
ACM
14 years 13 days ago
Policy-based access control for weakly consistent replication
Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be tempora...
Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry
DBSEC
2000
112views Database» more  DBSEC 2000»
13 years 8 months ago
Coordinating Policy for Federated Applications
Abstract At the start of its present term of office in 1997 the UK government published a planning document promising ubiquitous access to Electronic Health Records (EHRs) held wit...
Ken Moody