Sciweavers

715 search results - page 79 / 143
» On Run-Time Enforcement of Policies
Sort
View
ESCIENCE
2006
IEEE
14 years 1 months ago
Communication over a Secured Heterogeneous Grid with the GriddLeS Runtime Environment
Scientific workflows are a powerful programming technique for specifying complex computations using a number of otherwise independent components. When used in a Grid environment, ...
Jagan Kommineni, David Abramson, Jefferson Tan
MICRO
2009
IEEE
121views Hardware» more  MICRO 2009»
14 years 2 months ago
Application-aware prioritization mechanisms for on-chip networks
Network-on-Chips (NoCs) are likely to become a critical shared resource in future many-core processors. The challenge is to develop policies and mechanisms that enable multiple ap...
Reetuparna Das, Onur Mutlu, Thomas Moscibroda, Chi...
ICDE
2007
IEEE
164views Database» more  ICDE 2007»
14 years 2 months ago
Multi-session Separation of Duties (MSoD) for RBAC
Separation of duties (SoD) is a key security requirement for many business and information systems. Role Based Access Controls (RBAC) is a relatively new paradigm for protecting i...
David W. Chadwick, Wensheng Xu, Sassa Otenko, Roma...
ICSE
2009
IEEE-ACM
14 years 8 months ago
Safe-commit analysis to facilitate team software development
Software development teams exchange source code in shared repositories. These repositories are kept consistent by having developers follow a commit policy, such as "Program e...
Jan Wloka, Barbara G. Ryder, Frank Tip, Xiaoxia Re...
EUROSEC
2009
ACM
14 years 2 months ago
QuanTM: a quantitative trust management system
Quantitative Trust Management (QTM) provides a dynamic interpretation of authorization policies for access control decisions based on upon evolving reputations of the entities inv...
Andrew G. West, Adam J. Aviv, Jian Chang, Vinayak ...