Sciweavers

1627 search results - page 162 / 326
» On context in authorization policy
Sort
View
DATE
2010
IEEE
139views Hardware» more  DATE 2010»
14 years 3 months ago
Constant-time admission control for Deadline Monotonic tasks
—The admission control problem is concerned with determining whether a new task may be accepted by a system consisting of a set of running tasks, such that the already admitted a...
Alejandro Masrur, Samarjit Chakraborty, Georg F&au...
DANCE
2002
IEEE
14 years 3 months ago
The RadioActive Networking Architecture
This paper describes the activities in Application Level Active Networks (ALAN) under the DARPA-funded RADIOACTIVE Project; this is closely related to work carried out under a Eur...
Peter T. Kirstein, Piers O'Hanlon, Ken Carlberg, P...
FAST
2010
14 years 19 days ago
quFiles: The Right File at the Right Time
is a unifying abstraction that simplifies data management by encapsulating different physical representations of the same logical data. Similar to a quBit (quantum bit), the parti...
Kaushik Veeraraghavan, Jason Flinn, Edmund B. Nigh...
CCS
2008
ACM
14 years 9 days ago
Privacy-safe network trace sharing via secure queries
Privacy concerns relating to sharing network traces have traditionally been handled via sanitization, which includes removal of sensitive data and IP address anonymization. We arg...
Jelena Mirkovic
AIIA
2005
Springer
14 years 8 days ago
Argumentation for Access Control
In this paper we are interested in argument based reasoning for access control, for example in the context of agents negotiating access to resources or web services in virtual orga...
Guido Boella, Joris Hulstijn, Leendert W. N. van d...