Sciweavers

270 search results - page 20 / 54
» Idea: Efficient Evaluation of Access Control Constraints
Sort
View
CAISE
2001
Springer
14 years 7 hour ago
Objects Control for Software Configuration Management
A major requirement in Software Engineering is to reduce the time to market. This requirement along with a demand for product sophistication and better quality has led to larger te...
Jacky Estublier
CCS
2005
ACM
14 years 1 months ago
CPOL: high-performance policy evaluation
Policy enforcement is an integral part of many applications. Policies are often used to control access to sensitive information. Current policy specification languages give users ...
Kevin Borders, Xin Zhao, Atul Prakash
ICDE
2003
IEEE
157views Database» more  ICDE 2003»
14 years 8 months ago
Energy Efficient Index for Querying Location-Dependent Data in Mobile Broadcast Environments
We are witnessing in recent years growing interest for location-dependent information services among mobile users. This paper examines the issue of processing locationdependent qu...
Jianliang Xu, Baihua Zheng, Wang-Chien Lee, Dik Lu...
CORR
2008
Springer
119views Education» more  CORR 2008»
13 years 7 months ago
Prototyping and Performance Analysis of a QoS MAC Layer for Industrial Wireless Network
: Today's industrial sensor networks require strong reliability and guarantees on messages delivery. These needs are even more important in real time applications like control...
Adrien van den Bossche, Thierry Val, Eric Campo
PERCOM
2006
ACM
14 years 7 months ago
Avoiding privacy violations caused by context-sensitive services
The increasing availability of information about people's context makes it possible to deploy context-sensitive services, where access to resources provided or managed by a s...
Urs Hengartner, Peter Steenkiste