Sciweavers

1995 search results - page 303 / 399
» Belief in Information Flow
Sort
View
ACSAC
2000
IEEE
14 years 2 months ago
History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control
This contribution discusses a network-level access control technique that applies the non-discretionary access control model to individual data packets that are exchanged between ...
Reiner Sailer, M. Kabatnik
ICNP
1998
IEEE
14 years 2 months ago
A State Management Protocol for IntServ, DiffServ and Label Switching
Providing Quality of Service (QOS) in an efficient and scalable manner in the Internet is a topic of active research. The technologies that have drawn the most attention are Integ...
Hari Adiseshu, Guru M. Parulkar, Raj Yavatkar
ACISP
1998
Springer
14 years 2 months ago
Meta Objects for Access Control: Role-Based Principals
Abstract. Most current object-based distributed systems support access control lists for access control. However, it is difficult to determine which principal information to use fo...
Thomas Riechmann, Jürgen Kleinöder
CLADE
2004
IEEE
14 years 1 months ago
A Collaborative Informatics Infrastructure for Multi-scale Science
The Collaboratory for Multi-scale Chemical Science (CMCS) is developing a powerful informaticsbased approach to synthesizing multi-scale information to support a systems-based res...
James D. Myers, Thomas C. Allison, Sandra Bittner,...
PLDI
2000
ACM
14 years 1 months ago
Off-line variable substitution for scaling points-to analysis
Most compiler optimizations and software productivity tools rely on information about the effects of pointer dereferences in a program. The purpose of points-to analysis is to com...
Atanas Rountev, Satish Chandra