Sciweavers

882 search results - page 151 / 177
» On the Negotiation of Access Control Policies
Sort
View
DBSEC
2000
95views Database» more  DBSEC 2000»
13 years 9 months ago
Wrappers - a mechanism to support state-based authorisation in Web applications
The premises of this paper are 1) security is application dependent because application semantics directly influence proper protection; but 2) applications are generally too compl...
Martin S. Olivier, Ehud Gudes
DMDW
2000
118views Management» more  DMDW 2000»
13 years 9 months ago
View security as the basis for data warehouse security
Access. permissions in a data warehouse are currently managed in a separate world from the sources' policies. The consequences are inconsistencies, slow response to change, a...
Arnon Rosenthal, Edward Sciore
IJHPCN
2008
75views more  IJHPCN 2008»
13 years 8 months ago
Enhancing GridFTP performance using intelligent gateways
: To improve throughput of grid data servers under heavy loads or under denial of service attacks, it is important to service requests differentially, giving preference to ongoing ...
Onur Demir, Michael R. Head, Kanad Ghose, Madhusud...
TWC
2008
103views more  TWC 2008»
13 years 7 months ago
Performance analysis of a cross-layer handoff ordering scheme in wireless networks
In this paper we propose a cross-layer handoff ordering scheme. The frame success rate (FSR) is adopted as the basis of prioritization. Different quality of service (QoS) requireme...
Po-Chiang Lin, Tsungnan Lin, Chiapin Wang
EUROSYS
2007
ACM
14 years 5 months ago
Competitive prefetching for concurrent sequential I/O
During concurrent I/O workloads, sequential access to one I/O stream can be interrupted by accesses to other streams in the system. Frequent switching between multiple sequential ...
Chuanpeng Li, Kai Shen, Athanasios E. Papathanasio...