Sciweavers

3712 search results - page 552 / 743
» Role-Based Access Control
Sort
View
105
Voted
NDSS
2009
IEEE
15 years 9 months ago
Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems
Host compromise is a serious computer security problem today. To better protect hosts, several Mandatory Access Control systems, such as Security Enhanced Linux (SELinux) and AppA...
Hong Chen, Ninghui Li, Ziqing Mao
135
Voted
ICST
2009
IEEE
15 years 9 months ago
An Initial Characterization of Industrial Graphical User Interface Systems
To date we have developed and applied numerous model-based GUI testing techniques; however, we are unable to provide definitive improvement schemes to real-world GUI test planners...
Penelope A. Brooks, Brian P. Robinson, Atif M. Mem...
93
Voted
INFOCOM
2009
IEEE
15 years 9 months ago
Minimizing Rulesets for TCAM Implementation
—Packet classification is a function increasingly used in a number of networking appliances and applications. Typically, sists of a set of abstract classifications, and a set o...
Rick McGeer, Praveen Yalagandula
111
Voted
INFOCOM
2009
IEEE
15 years 9 months ago
P2P-TV Systems under Adverse Network Conditions: A Measurement Study
Abstract—In this paper we define a simple experimental setup to analyze the behavior of commercial P2P-TV applications under adverse network conditions. Our goal is to reveal th...
Eugenio Alessandria, Massimo Gallo, Emilio Leonard...
INFOCOM
2009
IEEE
15 years 9 months ago
muNet: Harnessing Multiuser Capacity in Wireless Mesh Networks
— We present muNet, a wireless mesh network design and implementation to harness the multiuser capacity of wireless channels. Traditionally, media access control is designed to s...
Li Li, Richard Alimi, Ramachandran Ramjee, Harish ...