Access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large ...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...
This paper presents HomeViews, a peer-to-peer middleware system for building personal data management applications. HomeViews provides abstractions and services for data organizat...
Roxana Geambasu, Magdalena Balazinska, Steven D. G...
Cyber Physical Systems (CPSs) have grand visions with great socio-economic impacts such as blackout-free electricity supply and real-time disaster recovery. A key challenge is pro...
This paper presents a method for admission control and request scheduling for multiply-tiered e-commerce Web sites, achieving both stable behavior during overload and improved res...
Sameh Elnikety, Erich M. Nahum, John M. Tracey, Wi...
Several powerful forces are gathering to make fundamental and irrevocable changes to the century-old grid. The nextgeneration grid, often called the `smart grid,' will featur...