Sciweavers

427 search results - page 7 / 86
» Policies: Giving Users Control over Calls
Sort
View
AINA
2007
IEEE
14 years 4 months ago
A Location-Aware Mobile Call Handling Assistant
With the near ubiquity of mobile phones, people are reachable almost anywhere and at any time. At the same time we see an increasing need for people to limit their interactions on...
Ibrahim Bokharouss, Wayne Wobcke, Yiu-Wa Chan, And...
CSFW
2006
IEEE
14 years 3 months ago
Policy Analysis for Administrative Role Based Access Control
Role-Based Access Control (RBAC) is a widely used model for expressing access control policies. In large organizations, the RBAC policy may be collectively managed by many adminis...
Amit Sasturkar, Ping Yang, Scott D. Stoller, C. R....
EDBT
2008
ACM
137views Database» more  EDBT 2008»
14 years 10 months ago
ACCOn: checking consistency of XML write-access control policies
XML access control policies involving updates may contain security flaws, here called inconsistencies, in which a forbidden operation may be simulated by performing a sequence of ...
Loreto Bravo, James Cheney, Irini Fundulaki
SIGOPS
2008
170views more  SIGOPS 2008»
13 years 9 months ago
I/O resource management through system call scheduling
A principal challenge in operating system design is controlling system throughput and responsiveness while maximizing resource utilization. Unlike previous attempts in kernel reso...
Silviu S. Craciunas, Christoph M. Kirsch, Harald R...
IAT
2006
IEEE
14 years 3 months ago
A Call Handling Assistant for Mobile Devices
With the near ubiquity of mobile phones, people are reachable almost anywhere and at any time. The convenience this provides for people to more effectively combine different aspec...
Wayne Wobcke, Rita Chan, Andrew Limaru