Sciweavers

427 search results - page 27 / 86
» Policies: Giving Users Control over Calls
Sort
View
ICIC
2005
Springer
14 years 3 months ago
Performance Comparison of SCTP and TCP over Linux Platform
Stream Control Transmission Protocol (SCTP) is the third transport layer protocol next to TCP and UDP. The SCTP provides some distinctive features over the TCP. This paper is purpo...
Jong-Shik Ha, Sang-Tae Kim, Seok Joo Koh
WWW
2010
ACM
14 years 4 months ago
Privacy wizards for social networking sites
Privacy is an enormous problem in online social networking sites. While sites such as Facebook allow users fine-grained control over who can see their profiles, it is difficult ...
Lujun Fang, Kristen LeFevre
USENIX
2003
13 years 11 months ago
Controlling Your PLACE in the File System with Gray-box Techniques
We present the design and implementation of PLACE, a gray-box library for controlling file layout on top of FFSlike file systems. PLACE exploits its knowledge of FFS layout poli...
James A. Nugent, Andrea C. Arpaci-Dusseau, Remzi H...
ICPADS
2006
IEEE
14 years 3 months ago
Policy-Directed Data Movement in Grids
One of the guiding principles of the Grid is local (site) autonomy. Resource owners maintain control over their resources even when those resources are part of a larger Grid. In o...
Jun Feng, Lingling Cui, Glenn S. Wasson, Marty Hum...
ESORICS
2008
Springer
13 years 11 months ago
On the Security of Delegation in Access Control Systems
Delegation is a mechanism that allows a user A to act on another user B's behalf by making B's access rights available to A. It is well recognized as an important mechani...
Qihua Wang, Ninghui Li, Hong Chen