Sciweavers

1082 search results - page 74 / 217
» Policy support for call control
Sort
View
DBSEC
2004
83views Database» more  DBSEC 2004»
13 years 10 months ago
Attribute Mutability in Usage Control
The notion of Usage Control (UCON) has been introduced recently to extend traditional access controls by including three decision factors called authorizations, obligations, and co...
Jaehong Park, Xinwen Zhang, Ravi S. Sandhu
JISE
2008
151views more  JISE 2008»
13 years 9 months ago
Design of QoS and Admission Control for VoIP Services Over IEEE 802.11e WLANs
Supporting telephone services using wireless LAN as the access network is an important application nowadays. The SIP and IEEE 802.11e are the two most promising protocols to suppo...
Pei-Yeh Wu, Jen-Jee Chen, Yu-Chee Tseng, Hung-Wei ...
CSFW
2005
IEEE
14 years 2 months ago
Nomad: A Security Model with Non Atomic Actions and Deadlines
Modelling security policies requires means to specify permissions and prohibitions. However, this is generally not sufficient to express security properties such as availability ...
Frédéric Cuppens, Nora Cuppens-Boula...
SACMAT
2009
ACM
14 years 3 months ago
Trojan horse resistant discretionary access control
Modern operating systems primarily use Discretionary Access Control (DAC) to protect files and other operating system resources. DAC mechanisms are more user-friendly than Mandat...
Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang
NOSSDAV
2005
Springer
14 years 2 months ago
Interactive media server with media synchronized RAID storage system
We propose an efficient placement algorithm and per-disk prefetching method to effectively support interactive operations in the media server. Our placement policy is incorporate...
Seung Ho Lim, Yo-Won Jeong, Kyu Ho Park