Sciweavers

715 search results - page 91 / 143
» On Run-Time Enforcement of Policies
Sort
View
DLOG
2009
13 years 8 months ago
Using Description Logics in Relation Based Access Control
Relation Based Access Control (RelBAC) is an access control model designed for the new scenarios of access control on Web 2.0. Under this model, we discuss in this paper how to for...
Rui Zhang, Alessandro Artale, Fausto Giunchiglia, ...
CORR
2006
Springer
113views Education» more  CORR 2006»
13 years 7 months ago
Event Systems and Access Control
Abstract. We consider the interpretations of notions of access control (permissions, interdictions, obligations, and user rights) as run-time properties of information systems spec...
Dominique Méry, Stephan Merz
FAST
2009
13 years 5 months ago
Towards Semantics for Provenance Security
Provenance records the history of data. Careless use of provenance may violate the security policies of data. Moreover, the provenance itself may be sensitive information, necessi...
Stephen Chong
SOSP
2009
ACM
14 years 4 months ago
Quincy: fair scheduling for distributed computing clusters
This paper addresses the problem of scheduling concurrent jobs on clusters where application data is stored on the computing nodes. This setting, in which scheduling computations ...
Michael Isard, Vijayan Prabhakaran, Jon Currey, Ud...
RTSS
1999
IEEE
13 years 12 months ago
A Scalable Solution to the Multi-Resource QoS Problem
The problem of maximizing system utility by allocating a single finite resource to satisfy discrete Quality of Service (QoS) requirements of multiple applications along multiple Q...
Chen Lee, John P. Lehoczky, Daniel P. Siewiorek, R...