Sciweavers

1627 search results - page 189 / 326
» On context in authorization policy
Sort
View
COMPCON
1995
IEEE
14 years 1 months ago
Tempest: A Substrate for Portable Parallel Programs
This paper describes Tempest, a collection of mechanisms for communication and synchronization in parallel programs. With these mechanisms, authors of compilers, libraries, and ap...
Mark D. Hill, James R. Larus, David A. Wood
TIC
2000
Springer
124views System Software» more  TIC 2000»
14 years 1 months ago
Sound and Complete Elimination of Singleton Kinds
Singleton kinds provide an elegant device for expressing type equality information resulting from modern module languages, but they can severely complicate the metatheory of langu...
Karl Crary
LISA
2007
14 years 13 days ago
Usher: An Extensible Framework for Managing Clusters of Virtual Machines
Usher is a virtual machine management system designed to impose few constraints upon the computing environment under its management. Usher enables administrators to choose how the...
Marvin McNett, Diwaker Gupta, Amin Vahdat, Geoffre...
CHI
2008
ACM
14 years 3 days ago
Effects of intelligent notification management on users and their tasks
We present a novel system for notification management and report results from two studies testing its performance and impact. The system uses statistical models to realize defer-t...
Shamsi T. Iqbal, Brian P. Bailey
ESORICS
2008
Springer
13 years 12 months ago
On the Security of Delegation in Access Control Systems
Delegation is a mechanism that allows a user A to act on another user B's behalf by making B's access rights available to A. It is well recognized as an important mechani...
Qihua Wang, Ninghui Li, Hong Chen