Sciweavers

804 search results - page 70 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
CCS
2005
ACM
15 years 10 months ago
PeerAccess: a logic for distributed authorization
This paper introduces the PeerAccess framework for reasoning about authorization in open distributed systems, and shows how a parameterization of the framework can be used to reas...
Marianne Winslett, Charles C. Zhang, Piero A. Bona...
NETWORKING
2004
15 years 6 months ago
Fairness Issues in Bus-Based Optical Access Networks
Packet-based optical access ring is becoming a promising solution in metropolitan networks. Its performance depends mainly on how optical resource sharing takes place among the dif...
Nizar Bouabdallah, André-Luc Beylot, Guy Pu...
SACMAT
2010
ACM
15 years 9 months ago
Monitoring security policies with metric first-order temporal logic
We show the practical feasibility of monitoring complex security properties using a runtime monitoring approach for metric first-order temporal logic. In particular, we show how ...
David A. Basin, Felix Klaedtke, Samuel Müller
INTERACT
2003
15 years 6 months ago
The Pragmatic Web: Agent-Based Multimodal Web Interaction with no Browser in Sight
: To a large degree information has become accessible – anytime, anywhere – but not necessarily useful. Unless the right information is presented at the right time, in the righ...
Alexander Repenning, James Sullivan
TMC
2008
210views more  TMC 2008»
15 years 4 months ago
Adaptive Cluster-Based Data Collection in Sensor Networks with Direct Sink Access
Recently wireless sensor networks featuring direct sink access have been studied as an efficient architecture to gather and process data for numerous applications. In this paper, w...
Mahdi Lotfinezhad, Ben Liang, Elvino S. Sousa