Sciweavers

1818 search results - page 155 / 364
» How users use access control
Sort
View
PIMRC
2010
IEEE
13 years 7 months ago
An implementation of Cognitive Resource Management on LTE platform
Abstract--In this paper we describe an LTE based demonstrator of the Universal Link Layer API (ULLA) and Cognitive Resource Manager (CRM) modules that are developed in ARAGORN proj...
Tao Cai, Georgios P. Koudouridis, Johan Johansson,...
ACSAC
1998
IEEE
14 years 1 months ago
The RRA97 Model for Role-Based Administration of Role Hierarchies
Abstract Role-based access control RBAC has recently received a lot of attention due to its exibility, expressive power and simplicity in administration. In RBAC permissions are as...
Ravi S. Sandhu, Qamar Munawer
HPDC
2006
IEEE
14 years 3 months ago
On the Harmfulness of Redundant Batch Requests
Most parallel computing resources are controlled by batch schedulers that place requests for computation in a queue until access to compute nodes is granted. Queue waiting times a...
Henri Casanova
IEEEARES
2008
IEEE
14 years 4 months ago
Context Ontology for Secure Interoperability
During interoperability exchanges, organizations are jointly conducting computation and sharing tasks. However, organizations can have different security policies. To guarantee g...
Céline Coma, Nora Cuppens-Boulahia, Fr&eacu...
HT
2003
ACM
14 years 2 months ago
"Common" web paths in a group adaptive system
In this paper we describe how we use a group of users’ accesses and interactions with web pages to discover and recommend relevant common navigation paths to other users. We col...
Maria Barra, Delfina Malandrino, Vittorio Scarano