Sciweavers

294 search results - page 31 / 59
» Conflict Analysis for Management Policies
Sort
View
CCS
2006
ACM
13 years 11 months ago
Secure attribute-based systems
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional attribute architectures and cryptosystems are ill-equipped to provide security ...
Matthew Pirretti, Patrick Traynor, Patrick McDanie...
CN
2007
168views more  CN 2007»
13 years 7 months ago
A MAC layer power management scheme for efficient energy delay tradeoff in a WLAN
— Energy efficient operation is of paramount importance for battery-powered wireless nodes. In an effort to conserve energy, standard protocols for WLANs have the provision for w...
Mahasweta Sarkar, Rene L. Cruz
DAWAK
2007
Springer
14 years 2 months ago
What-If Analysis for Data Warehouse Evolution
In this paper, we deal with the problem of performing what-if analysis for changes that occur in the schema/structure of the data warehouse We abstract software modules, queries, r...
George Papastefanatos, Panos Vassiliadis, Alkis Si...
ICEGOV
2007
ACM
13 years 11 months ago
Analysis of popular open source licenses and their applicability to e-governance
The paper analyses existing open source licenses with the aim of choosing a license that is suitable for e-Governance projects. A method is presented for systematically choosing t...
Jaijit Bhattacharya, Sourabh Suman
ESOP
2004
Springer
14 years 1 months ago
Trust Management in Strand Spaces: A Rely-Guarantee Method
We show how to combine trust management theories with nonce-based cryptographic protocols. The strand space framework for protocol analysis is extended by associating formulas from...
Joshua D. Guttman, F. Javier Thayer, Jay A. Carlso...