Sciweavers

5252 search results - page 899 / 1051
» Logic in Access Control
Sort
View
CNIS
2006
15 years 5 months ago
Towards effective packet classification
A variety of network security services, such as access control in firewalls and protocol analysis in intrusion detection systems, require the discrimination of packets based on th...
Yaxuan Qi, Jun Li
120
Voted
CSREAEEE
2006
117views Business» more  CSREAEEE 2006»
15 years 5 months ago
Open Source Implementation of the NIST Healthcare Standards Landscape
-- The NIST HealthCare Standards Landscape (HCSL) is a project to develop and demonstrate a web-based repository of information (called "Landscape") on healthcare informa...
Hai Tang, Roy Morgan, Thomas Rhodes, Clement Ridor...
149
Voted
AIPS
2003
15 years 5 months ago
The Role of Planning in Grid Computing
Grid computing gives users access to widely distributed networks of computing resources to solve large-scale tasks such as scientific computation. These tasks are defined as stand...
Jim Blythe, Ewa Deelman, Yolanda Gil, Carl Kesselm...
DBSEC
2001
129views Database» more  DBSEC 2001»
15 years 5 months ago
Secure Role-Based Workflow Models
: In this paper we introduce a series of reference models for Secure Role-Based Workflow systems. We build our models over the well-known RBAC96 framework. 96 model supports the no...
Savith Kandala, Ravi S. Sandhu
DAIS
2003
15 years 5 months ago
A Variable Cache Consistency Protocol for Mobile Systems Using Time Locks
Abstract. By locally caching data, mobile hosts can operate while disconnected from the central server, however, consistency of data becomes more difficult to maintain. In this pap...
Abhinav Vora, Zahir Tari, Peter Bertók