Sciweavers

374 search results - page 60 / 75
» Managing Delegation in Access Control Models
Sort
View
IISWC
2006
IEEE
14 years 23 days ago
Modeling Cache Sharing on Chip Multiprocessor Architectures
— As CMPs are emerging as the dominant architecture for a wide range of platforms (from embedded systems and game consoles, to PCs, and to servers) the need to manage on-chip res...
Pavlos Petoumenos, Georgios Keramidas, Håkan...
VTC
2007
IEEE
121views Communications» more  VTC 2007»
14 years 1 months ago
Downlink Traffic Power Characterization for Multi-Rate Wireless CDMA Data Networks
— The characterization of downlink traffic power is an important issue for the design of efficient call admission control (CAC) and radio resource management (RRM) procedures. In...
Ashraf S. Hasan Mahmoud
WPES
2003
ACM
13 years 12 months ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett
OWLED
2008
13 years 8 months ago
OWLlink: DIG for OWL 2
The OWLlink interface provides an implementation-neutral mechanism for accessing OWL reasoner functionality. In contrast to its DL-oriented predecessor DIG, OWLlink relies on OWL 2...
Thorsten Liebig, Marko Luther, Olaf Noppens, Maria...
DISCEX
2003
IEEE
14 years 22 hour ago
MuCAPSL
Secure group communication protocols have been designed to meet needs such as secure management of group membership, confidential group communication, and access control. New lan...
Jonathan K. Millen, Grit Denker