Sciweavers

1034 search results - page 164 / 207
» Dynamic Access Control Framework Based On Events
Sort
View
ESORICS
2000
Springer
13 years 11 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
CNSM
2010
13 years 6 months ago
MANET network management and performance monitoring for NHDP and OLSRv2
Abstract--Mobile Ad Hoc NETworks (MANETs) are generally thought of as infrastructureless and largely "un-managed" network deployments, capable of accommodating highly dyn...
Ulrich Herberg, Thomas Clausen, Robert Cole
ICSM
2009
IEEE
14 years 2 months ago
Modularizing error recovery
Error recovery is an integral concern in compilers. Improving error recovery requires comprehension of a large and complex code base, in order to locate the places which raise err...
Jeeva Paudel, Christopher Dutchyn
COMPSAC
2005
IEEE
14 years 1 months ago
Using AOP to Monitor and Administer Software for Grid Computing Environments
Monitoring is a task of collecting measurements that reflect the state of a system. Administration is a collection of tasks for control and manipulation of computer systems. Monito...
Mark Grechanik, Dewayne E. Perry, Don S. Batory
HYBRID
2004
Springer
14 years 1 months ago
Stochastic Hybrid Systems: Application to Communication Networks
We propose a model for Stochastic Hybrid Systems (SHSs) where transitions between discrete modes are triggered by stochastic events much like transitions between states of a contin...
João P. Hespanha