Sciweavers

715 search results - page 139 / 143
» On Run-Time Enforcement of Policies
Sort
View
ER
2004
Springer
169views Database» more  ER 2004»
14 years 26 days ago
Intentional Modeling to Support Identity Management
Identity management has arisen as a major and urgent challenge for internet-based communications and information services. Internet services involve complex networks of relationshi...
Lin Liu, Eric S. K. Yu
P2P
2003
IEEE
130views Communications» more  P2P 2003»
14 years 23 days ago
Peer-to-Peer Wireless LAN Consortia: Economic Modeling and Architecture
Abstract—In this paper we explore the incentive and architectural issues that arise in Consortia of Peer-to-Peer Wireless Local Area Networks. A P2P WLAN Consortium (PWC) is a co...
Panayotis Antoniadis, Costas Courcoubetis, Elias C...
INFOCOM
2000
IEEE
13 years 12 months ago
Differentiated Multimedia Web Services Using Quality Aware Transcoding
—The ability of a web service to provide low-latency access to its contents is constrained by available network bandwidth. It is important for the service to manage available ban...
Surendar Chandra, Carla Schlatter Ellis, Amin Vahd...
SIGMOD
1999
ACM
99views Database» more  SIGMOD 1999»
13 years 11 months ago
Belief Reasoning in MLS Deductive Databases
It is envisaged that the application of the multilevel security (MLS) scheme will enhance exibility and e ectiveness of authorization policies in shared enterprise databases and w...
Hasan M. Jamil
ACSAC
2007
IEEE
13 years 11 months ago
Distributed Secure Systems: Then and Now
The early 1980s saw the development of some rather sophisticated distributed systems. These were not merely networked file systems: rather, using remote procedure calls, hierarchi...
Brian Randell, John M. Rushby