Sciweavers

427 search results - page 10 / 86
» Policies: Giving Users Control over Calls
Sort
View
LCN
2003
IEEE
14 years 3 months ago
Measuring the Impact of Slow User Motion on Packet Loss and Delay over IEEE 802.11b Wireless Links
IEEE 802.11b compliant WLAN technology is increasingly used for cordless telephone services. Often, a WLAN phone is moved during a call. In the present paper we explore to what ex...
Christian Hoene, André Günther, Adam W...
ACSAC
2006
IEEE
14 years 3 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
DBSEC
2010
152views Database» more  DBSEC 2010»
13 years 11 months ago
Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems
Abstract. We present a modelling language, called X-Policy, for webbased collaborative systems with dynamic access control policies. The access to resources in these systems depend...
Hasan Qunoo, Mark Ryan
JCP
2007
121views more  JCP 2007»
13 years 9 months ago
p-Trust: A New Model of Trust to Allow Finer Control Over Privacy in Peer-to-Peer Framework
— Every time a user conducts an electronic transaction over the Internet a wealth of personal information is revealed, either voluntarily or involuntarily. This causes serious br...
Sudip Chakraborty, Indrajit Ray
VLDB
2000
ACM
129views Database» more  VLDB 2000»
14 years 1 months ago
Offering a Precision-Performance Tradeoff for Aggregation Queries over Replicated Data
Strict consistency of replicated data is infeasible or not required by many distributed applications, so current systems often permit stale replication, in which cached copies of ...
Chris Olston, Jennifer Widom