Sciweavers

4118 search results - page 13 / 824
» Mechanisms for usage control
Sort
View
IDTRUST
2010
ACM
14 years 3 months ago
Practical and secure trust anchor management and usage
Public Key Infrastructure (PKI) security depends upon secure management and usage of trust anchors. Unfortunately, widely used mechanisms, management models and usage practices re...
Carl Wallace, Geoff Beier
ECRTS
2005
IEEE
14 years 2 months ago
Fast Component Interaction for Real-Time Systems
Open real-time systems provide for co-hosting hard-, soft- and non-real-time applications. Microkernel-based designs in addition allow for these applications to be mutually protec...
Udo Steinberg, Jean Wolter, Hermann Härtig
IKE
2003
13 years 9 months ago
The Research of the Development of an Intelligent Knowledge Service Model
Traditional knowledge management mechanism focused on the re-usage of knowledge library. However, it lacks the ability of knowledge innovation and co-creation. Meanwhile, employee...
Bih-Yaw Shih
GLOBECOM
2009
IEEE
14 years 3 months ago
Revenue Maximization for Communication Networks with Usage-Based Pricing
—We study the optimal usage-based pricing problem in a resource-bounded network with one profit-maximizing service provider and multiple groups of surplus-maximizing users. We ...
Shuqin Li, Jianwei Huang, Shuo-Yen Robert Li
SAJ
2002
97views more  SAJ 2002»
13 years 8 months ago
PrivGuard : a model to protect private information based on its usage
No reliable method currently exists to safeguard the privacy of private information. Privacy policies are insufficient as compliance can not be enforced automatically. In this pap...
Frans A. Lategan, Martin S. Olivier