Sciweavers

374 search results - page 64 / 75
» Managing Delegation in Access Control Models
Sort
View
CCS
2009
ACM
14 years 7 months ago
A conceptual framework for Group-Centric secure information sharing
In this paper, we propose a conceptual framework for developing a family of models for Group-Centric information sharing. The traditional approach to information sharing, characte...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...
GLOBECOM
2008
IEEE
13 years 7 months ago
On the Impact of Inter-Cell Interference in LTE
—While intercell interference coordination (ICIC) for the downlink of multi-cell systems in general and orthogonal frequency division multiple access (OFDMA) networks in particul...
András Rácz, Norbert Reider, G&aacut...
SIGCOMM
2009
ACM
14 years 1 months ago
Modeling and understanding end-to-end class of service policies in operational networks
Business and economic considerations are driving the extensive use of service differentiation in Virtual Private Networks (VPNs) operated for business enterprises today. The resul...
Yu-Wei Eric Sung, Carsten Lund, Mark Lyn, Sanjay G...
DBSEC
2009
122views Database» more  DBSEC 2009»
13 years 7 months ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald
HPDC
2010
IEEE
13 years 7 months ago
Efficient querying of distributed provenance stores
Current projects that automate the collection of provenance information use a centralized architecture for managing the resulting metadata - that is, provenance is gathered at rem...
Ashish Gehani, Minyoung Kim, Tanu Malik