Sciweavers

298 search results - page 48 / 60
» Reconciling role based management and role based access cont...
Sort
View
USENIX
1994
13 years 9 months ago
Key Management in an Encrypting File System
As distributed computing systems grow in size, complexity and variety of application, the problem of protecting sensitive data from unauthorized disclosure and tampering becomes i...
Matt Blaze
SIGCOMM
2009
ACM
14 years 2 months ago
In defense of wireless carrier sense
Carrier sense is often used to regulate concurrency in wireless medium access control (MAC) protocols, balancing interference protection and spatial reuse. Carrier sense is known ...
Micah Z. Brodsky, Robert T. Morris
WETICE
2008
IEEE
14 years 2 months ago
On the Modeling of Bell-LaPadula Security Policies Using RBAC
The Bell-LaPadula security model is a hybrid model that combines mandatory access controls and discretionary access controls. The Bell-LaPadula security model has been widely acce...
Gansen Zhao, David W. Chadwick
SAC
2004
ACM
14 years 1 months ago
Web Services: separation of concerns: computation coordination communication
The purpose of this paper is to investigate the use of a new concept in component communication, expressed by the channel based coordination language called ρέω, in the coordina...
Theophilos A. Limniotes, George A. Papadopoulos, F...
DLOG
2006
13 years 9 months ago
Data Complexity of Answering Unions of Conjunctive Queries in SHIQ
The novel context of accessing and querying large data repositories through ontologies that are formalized in terms of expressive DLs requires on the one hand to consider query an...
Magdalena Ortiz, Diego Calvanese, Thomas Eiter