Sciweavers

136 search results - page 25 / 28
» Deriving Enforcement Mechanisms from Policies
Sort
View
DIMVA
2008
13 years 9 months ago
Expanding Malware Defense by Securing Software Installations
Software installation provides an attractive entry vector for malware: since installations are performed with administrator privileges, malware can easily get the enhanced level of...
Weiqing Sun, R. Sekar, Zhenkai Liang, V. N. Venkat...
ICC
2007
IEEE
101views Communications» more  ICC 2007»
13 years 11 months ago
Optimal Resource Allocation in Wireless Multiaccess Video Transmissions
We study the problem of optimal resource allocation for multi-user wireless video transmissions from an informationtheoretic point of view. We show that the previously known optima...
Cong Shen, Mihaela van der Schaar
SIGMETRICS
2010
ACM
193views Hardware» more  SIGMETRICS 2010»
13 years 7 months ago
Distributed caching over heterogeneous mobile networks
Sharing content over a mobile network through opportunistic contacts has recently received considerable attention. In proposed scenarios, users store content they download in a lo...
Stratis Ioannidis, Laurent Massoulié, Augus...
NOMS
2008
IEEE
123views Communications» more  NOMS 2008»
14 years 1 months ago
Model-based management of security services in complex network environments
Abstract—The security mechanisms employed in current networked environments are increasingly complex, and their configuration management has an important role for the protection...
João Porto de Albuquerque, Heiko Krumm, Pau...
RR
2010
Springer
13 years 5 months ago
Query-Based Access Control for Ontologies
Role-based access control is a standard mechanism in information systems. Based on the role a user has, certain information is kept from the user even if requested. For ontologies ...
Martin Knechtel, Heiner Stuckenschmidt