Sciweavers

499 search results - page 44 / 100
» An Integrated Model for Access Control and Information Flow ...
Sort
View
SIGCOMM
2010
ACM
13 years 7 months ago
capDL: a language for describing capability-based systems
Capabilities provide an access control model that can be used to construct systems where safety of protection can be precisely determined. However, in order to be certain of the s...
Ihor Kuz, Gerwin Klein, Corey Lewis, Adam Walker
ICSE
2007
IEEE-ACM
14 years 7 months ago
The CRUTIAL Architecture for Critical Information Infrastructures
Abstract. In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized natur...
Paulo Veríssimo, Nuno Ferreira Neves, Migue...
IJCAI
2003
13 years 9 months ago
Frequency-Based Coverage Statistics Mining for Data Integration
Recent work in data integration has shown the importance of statistical information about the coverage and overlap of data sources for efficient query processing. Gathering and s...
Zaiqing Nie, Subbarao Kambhampati
BIS
2007
120views Business» more  BIS 2007»
13 years 9 months ago
Security Issues for the Use of Semantic Web in E-Commerce
As the ontologies are the pivotal element of the Semantic Web in E-Commerce, it is necessary to protect the ontology’s integrity and availability. In addition, both suppliers and...
Andreas Ekelhart, Stefan Fenz, A. Min Tjoa, Edgar ...
MONET
2006
97views more  MONET 2006»
13 years 7 months ago
Pre-Reply Probe and Route Request Tail: Approaches for Calculation of Intra-Flow Contention in Multihop Wireless Networks
Several applications have been envisioned for multihop wireless networks that require different qualities of service from the network. In order to support such applications, the n...
Kimaya Sanzgiri, Ian D. Chakeres, Elizabeth M. Bel...