Sciweavers

804 search results - page 117 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
PVLDB
2008
163views more  PVLDB 2008»
15 years 4 months ago
AlvisP2P: scalable peer-to-peer text retrieval in a structured P2P network
In this paper we present the AlvisP2P IR engine, which enables efficient retrieval with multi-keyword queries from a global document collection available in a P2P network. In such...
Toan Luu, Gleb Skobeltsyn, Fabius Klemm, Maroje Pu...
CRISIS
2009
15 years 2 months ago
A secured delegation of remote services on IPv6 home networks
IPv6 is an attractive technology for innovative services such as health care monitoring, alarm systems, peer to peer applications, virtual machine systems and so on. The generaliza...
Stere Preda, Laurent Toutain, Nora Cuppens-Boulahi...
MICRO
2010
IEEE
121views Hardware» more  MICRO 2010»
15 years 2 months ago
Probabilistic Distance-Based Arbitration: Providing Equality of Service for Many-Core CMPs
Abstract--Emerging many-core chip multiprocessors will integrate dozens of small processing cores with an on-chip interconnect consisting of point-to-point links. The interconnect ...
Michael M. Lee, John Kim, Dennis Abts, Michael R. ...
CCS
2008
ACM
15 years 6 months ago
Stale-safe security properties for group-based secure information sharing
Attribute staleness arises due to the physical distribution of authorization information, decision and enforcement points. This is a fundamental problem in virtually any secure di...
Ram Krishnan, Jianwei Niu, Ravi S. Sandhu, William...
MSWIM
2005
ACM
15 years 10 months ago
An analytical model of the virtual collision handler of 802.11e
A number of analytical models have been proposed to describe the priority schemes of the Enhanced Distributed Channel Access (EDCA) mechanism of the IEEE 802.11e standard. EDCA pr...
Paal E. Engelstad, Olav N. Østerbø