Sciweavers

837 search results - page 159 / 168
» Rewriting-Based Access Control Policies
Sort
View
IMC
2010
ACM
13 years 4 months ago
On economic heavy hitters: shapley value analysis of 95th-percentile pricing
Cost control for the Internet access providers (AP) influences not only the nominal speeds offered to the customers, but also other, more controversial, policies related to traffi...
Rade Stanojevic, Nikolaos Laoutaris, Pablo Rodrigu...
STORAGESS
2006
ACM
14 years 20 days ago
Long-term threats to secure archives
Archival storage systems are designed for a write-once, read-maybe usage model which places an emphasis on the long-term preservation of their data contents. In contrast to tradit...
Mark W. Storer, Kevin M. Greenan, Ethan L. Miller
CSCW
2000
ACM
13 years 11 months ago
WebSplitter: a unified XML framework for multi-device collaborative Web browsing
WebSplitter symbolizes the union of pervasive multi-device computing and collaborative multi-user computing. WebSplitter provides a unified XML framework that enables multi-device...
Richard Han, Veronique Perret, Mahmoud Naghshineh
ACMICEC
2008
ACM
262views ECommerce» more  ACMICEC 2008»
13 years 8 months ago
Preventing information leakage between collaborating organisations
Information sharing and protection against leakage is a critical problem especially for organisations having sensitive information. Sharing content between individuals in the same...
Muntaha Alawneh, Imad M. Abbadi
CCS
2007
ACM
14 years 27 days ago
Hardware-rooted trust for secure key management and transient trust
We propose minimalist new hardware additions to a microprocessor chip that protect cryptographic keys in portable computing devices which are used in the field but owned by a cen...
Jeffrey S. Dwoskin, Ruby B. Lee