Sciweavers

481 search results - page 67 / 97
» Analyzing and Managing Role-Based Access Control Policies
Sort
View
CCS
2005
ACM
14 years 2 months ago
Automated trust negotiation using cryptographic credentials
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Be...
Jiangtao Li, Ninghui Li, William H. Winsborough
ISM
2005
IEEE
169views Multimedia» more  ISM 2005»
14 years 2 months ago
A Framework to Improve QoS and Mobility Management for Multimedia Applications in the IMS
The new IP Multimedia Subsystem (IMS) provides an overlay architecture for IP based core networks and enables the efficient provision of an open set of potentially highly integrat...
Fabricio Carvalho de Gouveia, Thomas Magedanz
MICRO
2006
IEEE
102views Hardware» more  MICRO 2006»
14 years 2 months ago
Managing Distributed, Shared L2 Caches through OS-Level Page Allocation
This paper presents and studies a distributed L2 cache management approach through OS-level page allocation for future many-core processors. L2 cache management is a crucial multi...
Sangyeun Cho, Lei Jin
USENIX
2003
13 years 10 months ago
Controlling Your PLACE in the File System with Gray-box Techniques
We present the design and implementation of PLACE, a gray-box library for controlling file layout on top of FFSlike file systems. PLACE exploits its knowledge of FFS layout poli...
James A. Nugent, Andrea C. Arpaci-Dusseau, Remzi H...
IJISEC
2007
149views more  IJISEC 2007»
13 years 8 months ago
Dynamic security labels and static information flow control
This paper presents a language in which information flow is securely controlled by a type system, yet the security class of data can vary dynamically. Information flow policies ...
Lantian Zheng, Andrew C. Myers