Sciweavers

427 search results - page 47 / 86
» Policies: Giving Users Control over Calls
Sort
View
SIGCOMM
2004
ACM
14 years 3 months ago
A system for authenticated policy-compliant routing
Internet end users and ISPs alike have little control over how packets are routed outside of their own AS, restricting their ability to achieve levels of performance, reliability,...
Barath Raghavan, Alex C. Snoeren
TCC
2009
Springer
114views Cryptology» more  TCC 2009»
14 years 10 months ago
Predicate Privacy in Encryption Systems
Predicate encryption is a new encryption paradigm which gives a master secret key owner fine-grained control over access to encrypted data. The master secret key owner can generat...
Emily Shen, Elaine Shi, Brent Waters
ICAC
2006
IEEE
14 years 4 months ago
The Making of SimEAC
— In this short paper, we give a brief overview a simulation environment, SimEAC, which was designed for testing algorithms with strong autonomic features. SimEAC enables a user ...
David Chisnall, Min Chen
CHI
2002
ACM
14 years 10 months ago
Interactive 3D flow visualization using a streamrunner
Flow visualization in 3D is challenging due to perceptual problems such as occlusion, lack of directional cues, lack of depth cues, and visual complexity. In this paper we present...
Robert S. lramee
CCS
2001
ACM
14 years 2 months ago
Interoperable strategies in automated trust negotiation
Automated trust negotiation is an approach to establishing trust between strangers through the exchange of digital credentials and the use of access control policies that specify ...
Ting Yu, Marianne Winslett, Kent E. Seamons