Sciweavers

798 search results - page 38 / 160
» Comparing the expressive power of access control models
Sort
View
RTAS
2010
IEEE
13 years 5 months ago
Timing Analysis for TDMA Arbitration in Resource Sharing Systems
Abstract--Modern computing systems have adopted multicore architectures and multiprocessor systems on chip (MPSoCs) for accommodating the increasing demand on computation power. Ho...
Andreas Schranzhofer, Jian-Jia Chen, Lothar Thiele
PCI
2009
Springer
14 years 7 days ago
A Foundation for Defining Security Requirements in Grid Computing
—Despite the wide adoption by the scientific community, grid technologies have not been given the appropriate attention by enterprises. This is merely due to the lack of enough s...
Antonios Gouglidis, Ioannis Mavridis
ALGOSENSORS
2004
Springer
14 years 1 months ago
WiseMAC: An Ultra Low Power MAC Protocol for Multi-hop Wireless Sensor Networks
WiseMAC is a medium access control protocol designed for wireless sensor networks. This protocol is based on non-persistent CSMA and uses the preamble sampling technique to minimiz...
Amre El-Hoiydi, Jean-Dominique Decotignie
SACMAT
2009
ACM
14 years 2 months ago
An algebra for fine-grained integration of XACML policies
Collaborative and distributed applications, such as dynamic coalitions and virtualized grid computing, often require integrating access control policies of collaborating parties. ...
Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, ...
ISAAC
2004
Springer
87views Algorithms» more  ISAAC 2004»
14 years 1 months ago
Random Access to Advice Strings and Collapsing Results
We propose a model of computation where a Turing machine is given random access to an advice string. With random access, an advice string of exponential length becomes meaningful ...
Jin-yi Cai, Osamu Watanabe