Sciweavers

769 search results - page 128 / 154
» Policy Storage for Role-Based Access Control Systems
Sort
View
RTS
2002
106views more  RTS 2002»
13 years 8 months ago
Cello: A Disk Scheduling Framework for Next Generation Operating Systems
In this paper, we present the Cello disk scheduling framework for meeting the diverse service requirements of applications. Cello employs a two-level disk scheduling architecture,...
Prashant J. Shenoy, Harrick M. Vin
WWW
2011
ACM
13 years 3 months ago
A middleware for securing mobile mashups
Mashups on traditional desktop devices are a well-known source of security risks. In this paper, we examine how these risks translate to mobile mashups and identify new risks caus...
Florent Batard, Karima Boudaoud, Michel Riveill
SASN
2003
ACM
14 years 2 months ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
ACSC
2003
IEEE
14 years 2 months ago
Context-Sensitive Mobile Database Summarisation
In mobile computing environments, as a result of the reduced capacity of local storage, it is commonly not feasible to replicate entire datasets on each mobile unit. In addition, ...
Darin Chan, John F. Roddick
CCS
2005
ACM
14 years 2 months ago
Control-flow integrity
Current software attacks often build on exploits that subvert machine-code execution. The enforcement of a basic safety property, Control-Flow Integrity (CFI), can prevent such at...
Martín Abadi, Mihai Budiu, Úlfar Erl...