Sciweavers

2655 search results - page 5 / 531
» Event Systems and Access Control
Sort
View
CODASPY
2012
12 years 3 months ago
Deriving implementation-level policies for usage control enforcement
Usage control is concerned with how data is used after access to it has been granted. As such, it is particularly relevant to end users who own the data. System implementations of...
Prachi Kumari, Alexander Pretschner
CAISE
2010
Springer
13 years 7 months ago
Dynamic Authorisation Policies for Event-Based Task Delegation
Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are tw...
Khaled Gaaloul, Ehtesham Zahoor, François C...
ICAC
2009
IEEE
14 years 2 months ago
Out-of-band detection of boot-sequence termination events
The popularization of both virtualization and CDP technologies mean that we can now watch disk accesses of systems from entities which are not controlled by the OS. This is a rich...
Naama Parush, Dan Pelleg, Muli Ben-Yehuda, Paula T...
PAM
2004
Springer
14 years 21 days ago
Inferring Queue Sizes in Access Networks by Active Measurement
Abstract. Router queues can impact both round-trip times and throughput. Yet little is publicly known about queue provisioning employed by Internet services providers for the route...
Mark Claypool, Robert E. Kinicki, Mingzhe Li, Jame...
FMCO
2005
Springer
116views Formal Methods» more  FMCO 2005»
14 years 27 days ago
Control of Modular and Distributed Discrete-Event Systems
Control of modular and distributed discrete-event systems appears as an approach to handle computational complexity of synthesizing supervisory controllers for large scale systems....
Jan Komenda, Jan H. van Schuppen