Sciweavers

294 search results - page 41 / 59
» Analyzing Consistency of Security Policies
Sort
View
NSPW
2006
ACM
14 years 1 months ago
Sanitization models and their limitations
This work explores issues of computational disclosure control. We examine assumptions in the foundations of traditional problem statements and abstract models. We offer a comprehe...
Rick Crawford, Matt Bishop, Bhume Bhumiratana, Lis...
GRID
2006
Springer
13 years 7 months ago
Cacheable Decentralized Groups for Grid Resource Access Control
Abstract-- Sharing data among collaborators in widely distributed systems remains a challenge due to limitations with existing methods for defining groups across administrative dom...
Jeffrey Hemmes, Douglas Thain
MINENET
2006
ACM
14 years 1 months ago
How to extract BGP peering information from the internet routing registry
We describe an on-line service, and its underlying methodology, designed to extract BGP peerings from the Internet Routing Registry. Both the method and the service are based on: ...
Giuseppe Di Battista, Tiziana Refice, Massimo Rimo...
EUC
2005
Springer
14 years 24 days ago
The Performance Estimation of the Situation Awareness RFID System from Ubiquitous Environment Scenario
Many sensors providing situation data will be in everywhere under the ubiquitous environment. It requires the current RFID system should be extended to recognize and use situation ...
Dongwon Jeong, Heeseo Chae, Hoh Peter In
CIKM
2009
Springer
13 years 11 months ago
Blog cascade affinity: analysis and prediction
Information propagation within the blogosphere is of much importance in implementing policies, marketing research, launching new products, and other applications. In this paper, w...
Hui Li, Sourav S. Bhowmick, Aixin Sun