Sciweavers

715 search results - page 96 / 143
» On Run-Time Enforcement of Policies
Sort
View
ENTCS
2006
135views more  ENTCS 2006»
13 years 7 months ago
Coordination Models Based on a Formal Model of Distributed Object Reflection
We propose a family of models of coordination of distributed object systems representing different views, with refinement relations between the different views. We start with dist...
Carolyn L. Talcott
PVLDB
2008
132views more  PVLDB 2008»
13 years 7 months ago
Access control over uncertain data
Access control is the problem of regulating access to secret information based on certain context information. In traditional applications, context information is known exactly, p...
Vibhor Rastogi, Dan Suciu, Evan Welbourne
SP
2000
IEEE
134views Security Privacy» more  SP 2000»
14 years 22 hour ago
Fang: A Firewall Analysis Engine
Today, even a moderately sized corporate intranet contains multiple firewalls and routers, which are all used to enforce various aspects of the global corporate security policy. ...
Alain J. Mayer, Avishai Wool, Elisha Ziskind
FAST
2004
13 years 9 months ago
A Versatile and User-Oriented Versioning File System
File versioning is a useful technique for recording a history of changes. Applications of versioning include backups and disaster recovery, as well as monitoring intruders' a...
Kiran-Kumar Muniswamy-Reddy, Charles P. Wright, An...
ICPPW
2009
IEEE
13 years 5 months ago
Improvement of Messages Delivery Time on Vehicular Delay-Tolerant Networks
Vehicular Delay-Tolerant Networks (VDTNs) are an application of the Delay-Tolerant Network (DTN) concept, where the movement of vehicles and their message relaying service is used ...
Vasco Nuno da Gama de Jesus Soares, Joel Jos&eacut...