Sciweavers

136 search results - page 20 / 28
» Deriving Enforcement Mechanisms from Policies
Sort
View
ACSAC
2006
IEEE
14 years 1 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
SIGCOMM
2009
ACM
14 years 2 months ago
Resonance: dynamic access control for enterprise networks
Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and sys...
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, Ru...
MOBIQUITOUS
2008
IEEE
14 years 1 months ago
A secure middleware for wireless sensor networks
SMEPP Light is a middleware for Wireless Sensor Networks (WSNs) based on mote-class sensors. It is derived from the specification developed under the framework of the SMEPP proje...
Claudio Vairo, Michele Albano, Stefano Chessa
CF
2004
ACM
14 years 29 days ago
Predictable performance in SMT processors
Current instruction fetch policies in SMT processors are oriented towards optimization of overall throughput and/or fairness. However, they provide no control over how individual ...
Francisco J. Cazorla, Peter M. W. Knijnenburg, Riz...
TMC
2010
178views more  TMC 2010»
13 years 5 months ago
Cost Analysis of Short Message Retransmissions
Short Message Service (SMS) is the most popular mobile data service today. In Taiwan, a subscriber sends more than 200 short messages per year on average. The huge demand for SMS ...
Sok-Ian Sou, Yi-Bing Lin, Chao-Liang Luo