Sciweavers

798 search results - page 92 / 160
» Comparing the expressive power of access control models
Sort
View
POLICY
2007
Springer
14 years 3 months ago
Using SAML and XACML for Complex Resource Provisioning in Grid Based Applications
This paper presents ongoing research and current results on the development of flexible access control infrastructure for complex resource provisioning (CRP) in Grid-based applica...
Yuri Demchenko, Leon Gommans, Cees de Laat
COMCOM
2010
167views more  COMCOM 2010»
13 years 6 months ago
Effective load for flow-level performance modelling of file transfers in wireless LANs
Today, a wide range of 802.11-based Wireless LANs (WLANs) have become dominant to provide wireless Internet access for file transfers. For engineering purposes, there is a need fo...
Geert Jan Hoekstra, Robert D. van der Mei
ASAP
1997
IEEE
93views Hardware» more  ASAP 1997»
14 years 1 months ago
A Novel Sequencer Hardware for Application Specific Computing
This paper introduces a powerful novel sequencer for controlling computational machines and for structured DMA (direct memory access) applications. It is mainly focused on applica...
Reiner W. Hartenstein, Jürgen Becker, Michael...
CI
2000
114views more  CI 2000»
13 years 8 months ago
A Guided Tour through Some Extensions of the Event Calculus
Kowalski and Sergot's Event Calculus (EC) is a simple temporal formalism that, given a set of event occurrences, derives the maximal validity intervals (MVIs) over which prop...
Iliano Cervesato, Massimo Franceschet, Angelo Mont...
TDSC
2010
172views more  TDSC 2010»
13 years 3 months ago
Proactive Detection of Computer Worms Using Model Checking
Although recent estimates are speaking of 200,000 different viruses, worms, and Trojan horses, the majority of them are variants of previously existing malware. As these variants m...
Johannes Kinder, Stefan Katzenbeisser, Christian S...