Sciweavers

183 search results - page 20 / 37
» Safety analysis of usage control authorization models
Sort
View
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
14 years 2 months ago
Apply Model Checking to Security Analysis in Trust Management
Trust management is a form of access control that uses delegation to achieve scalability beyond a single organization or federation. However, delegation can be difficult to contr...
Mark Reith, Jianwei Niu, William H. Winsborough
SAC
1998
ACM
14 years 5 days ago
Object oriented process modeling with fuzzy logic
Fuzzy Logic has traditionally found an application in control theory, systems analysis, and artificial intelligence [9] [7]. However, it is very difficult to apply it to tradition...
Luigi Benedicenti, Giancarlo Succi, Tullio Vernazz...
ICC
2009
IEEE
154views Communications» more  ICC 2009»
14 years 3 months ago
Load Balancing vs. Distributed Rate Limiting: An Unifying Framework for Cloud Control
— With the expansion of cloud-based services, the question as to how to control usage of such large distributed systems has become increasingly important. Load balancing (LB), an...
Rade Stanojevic, Robert Shorten
IEEEARES
2008
IEEE
14 years 3 months ago
Context Ontology for Secure Interoperability
During interoperability exchanges, organizations are jointly conducting computation and sharing tasks. However, organizations can have different security policies. To guarantee g...
Céline Coma, Nora Cuppens-Boulahia, Fr&eacu...
BROADNETS
2007
IEEE
14 years 2 months ago
Design and control of optical grid networks
—Grid computing aims to realize a high-performance computing environment, while increasing the usage efficiency of installed resources. This puts considerable constraints on the...
Marc De Leenheer, Chris Develder, Tim Stevens, Bar...