Sciweavers

154 search results - page 23 / 31
» Providing Policy-Neutral and Transparent Access Control in E...
Sort
View
ICISC
2007
99views Cryptology» more  ICISC 2007»
13 years 9 months ago
Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module
VMM (virtual machine monitor) based system provides the useful inspection and interposition of guest OS. With proper modification of guest OS, we can obtain event-driven memory sn...
Ruo Ando, Youki Kadobayashi, Yoichi Shinoda
IPPS
1999
IEEE
13 years 11 months ago
Optimizing Irregular HPF Applications using Halos
This paper presents language features for High Performance Fortran HPF to specify non-local access patterns of distributed arrays, called halos, and to control the communication as...
Siegfried Benkner
POLICY
2001
Springer
13 years 12 months ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
ERCIMDL
2010
Springer
168views Education» more  ERCIMDL 2010»
13 years 8 months ago
The Planets Testbed - A Collaborative Research Environment for Digital Preservation
The Planets Testbed is an open access web application for the digital preservation community, providing an experimental framework for evaluating preservation tools and approaches i...
Brian Aitken, Seamus Ross, Andrew Lindley, Edith M...
HICSS
1999
IEEE
115views Biometrics» more  HICSS 1999»
13 years 11 months ago
Focusing on Mobility
In this paper, we motivate the importance of the field of mobile computing and survey current practical and formal approaches. We argue that the existing formalisms are not suffic...
Klaus Bergner, Radu Grosu, Andreas Rausch, Alexand...