Sciweavers

379 search results - page 59 / 76
» Processing Logical Access Control Command in Computer System
Sort
View
VLDB
1993
ACM
112views Database» more  VLDB 1993»
13 years 11 months ago
Specifying and Enforcing Intertask Dependencies
Extensions of the traditional atomic transaction model are needed to support the development of multi-system applications or work ows that access heterogeneous databases and legac...
Paul C. Attie, Munindar P. Singh, Amit P. Sheth, M...
POLICY
2004
Springer
14 years 28 days ago
A Decentralized Treatment of a Highly Distributed Chinese-Wall Policy
Access control (AC) technology has come a long way from its roots as the means for sharing resources between processes running on a single machine, to a mechanism for regulating t...
Naftaly H. Minsky
HYBRID
2010
Springer
14 years 2 months ago
On the connections between PCTL and dynamic programming
Probabilistic Computation Tree Logic (PCTL) is a wellknown modal logic which has become a standard for expressing temporal properties of finite-state Markov chains in the context...
Federico Ramponi, Debasish Chatterjee, Sean Summer...
PDPTA
2004
13 years 9 months ago
On the Design and Performance of Remote Disk Drivers for Clusters of PCs
This paper presents the design and performance of remote disk drivers for clusters of Commodity-Off-The-Shelf PCs that fetch disk blocks over System Area Networks. The driver offe...
Vlad Olaru, Walter F. Tichy
CCS
2008
ACM
13 years 9 months ago
Asynchronous policy evaluation and enforcement
Evaluating and enforcing policies in large-scale networks is one of the most challenging and significant problems facing the network security community today. Current solutions ar...
Matthew Burnside, Angelos D. Keromytis