Sciweavers

1082 search results - page 22 / 217
» Policy support for call control
Sort
View
IANDC
2008
140views more  IANDC 2008»
13 years 8 months ago
Information flow security in Boundary Ambients
A variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supporting the modelling of multi-level security policies. Ambients that may guarantee to proper...
Chiara Braghin, Agostino Cortesi, Riccardo Focardi
ICC
2007
IEEE
14 years 3 months ago
ORC-GPS: Output Rate-Controlled Scheduling Policy for Delay Guarantees
Abstract—Recently packet scheduling algorithms such as Packetized GPS (PGPS), Worst-case Fair Weighted Fair Queueing (WF2 Q) and Self-Clocked Fair Queueing (SCFQ) have been propo...
Masaki Hanada, Hidenori Nakazato
IFIP
2010
Springer
13 years 3 months ago
Cryptographic Enforcement of Role-Based Access Control
Many cryptographic schemes have been designed to enforce information flow policies. However, enterprise security requirements are often better encoded, or can only be encoded, usin...
Jason Crampton
CSFW
2006
IEEE
14 years 2 months ago
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies
There is a growing interest in establishing rules to regulate the privacy of citizens in the treatment of sensitive personal data such as medical and financial records. Such rule...
Michael J. May, Carl A. Gunter, Insup Lee
IAT
2010
IEEE
13 years 6 months ago
Multiagent Meta-level Control for a Network of Weather Radars
It is crucial for embedded systems to adapt to the dynamics of open environments. This adaptation process becomes especially challenging in the context of multiagent systems. In t...
Shanjun Cheng, Anita Raja, Victor R. Lesser