Sciweavers

769 search results - page 77 / 154
» Policy Storage for Role-Based Access Control Systems
Sort
View
ESORICS
2009
Springer
14 years 9 months ago
PCAL: Language Support for Proof-Carrying Authorization Systems
By shifting the burden of proofs to the user, a proof-carrying authorization (PCA) system can automatically enforce complex access control policies. Unfortunately, managing those p...
Avik Chaudhuri, Deepak Garg
INFOCOM
2000
IEEE
14 years 1 months ago
Receiver Based Management of Low Bandwidth Access Links
Abstract—In this paper, we describe a receiver based congestion control policy that leverages TCP flow control mechanisms to prioritize mixed traffic loads across access links....
Neil T. Spring, Maureen Chesire, Mark Berryman, Vi...
NOMS
2000
IEEE
14 years 1 months ago
POWER prototype: towards integrated policy-based management
ot only high level description of abstract policy, but also enables such policy to be refined and eventually mapped into an appropriate configuration for controlling devices in the...
Marco Casassa Mont, Adrian Baldwin, Cheh Goh
PDCAT
2005
Springer
14 years 2 months ago
Authentication with controlled anonymity in P2P systems
This paper describes a new protocol for authentication in Peer-to-Peer systems. The protocol has been designed to meet specialized requirements of P2P systems, such as lack of dir...
Adam Wierzbicki, Aneta Zwierko, Zbigniew Kotulski
MSS
2005
IEEE
84views Hardware» more  MSS 2005»
14 years 2 months ago
Using MEMS-Based Storage to Boost Disk Performance
Non-volatile storage technologies such as flash memory, Magnetic RAM (MRAM), and MEMS-based storage are emerging as serious alternatives to disk drives. Among these, MEMS storage...
Feng Wang 0003, Bo Hong, Scott A. Brandt, Darrell ...