Sciweavers

769 search results - page 54 / 154
» Policy Storage for Role-Based Access Control Systems
Sort
View
FAST
2004
13 years 10 months ago
MEMS-based Storage Devices and Standard Disk Interfaces: A Square Peg in a Round Hole?
MEMS-based storage devices (MEMStores) are significantly different from both disk drives and semiconductor memories. The differences motivate the queswhether they need new abstrac...
Steven W. Schlosser, Gregory R. Ganger
ESORICS
2008
Springer
13 years 10 months ago
On the Security of Delegation in Access Control Systems
Delegation is a mechanism that allows a user A to act on another user B's behalf by making B's access rights available to A. It is well recognized as an important mechani...
Qihua Wang, Ninghui Li, Hong Chen
MSS
2003
IEEE
151views Hardware» more  MSS 2003»
14 years 2 months ago
Accurate Modeling of Cache Replacement Policies in a Data Grid
Caching techniques have been used to improve the performance gap of storage hierarchies in computing systems. In data intensive applications that access large data files over wid...
Ekow J. Otoo, Arie Shoshani
ICDCS
2000
IEEE
14 years 1 months ago
Highly Concurrent Shared Storage
1 Switched system-area networks enable thousands of storage devices to be shared and directly accessed by end hosts, promising databases and filesystems highly scalable, reliable ...
Khalil Amiri, Garth A. Gibson, Richard A. Golding
COORDINATION
2000
Springer
14 years 1 months ago
Coordination and Access Control in Open Distributed Agent Systems: The TuCSoN Approach
Coordination and access control are related issues in open distributed agent systems, being both concerned with governing interaction between agents and resources. In particular, w...
Marco Cremonini, Andrea Omicini, Franco Zambonelli