Sciweavers

183 search results - page 23 / 37
» Safety analysis of usage control authorization models
Sort
View
CCS
2009
ACM
14 years 9 months ago
A conceptual framework for Group-Centric secure information sharing
In this paper, we propose a conceptual framework for developing a family of models for Group-Centric information sharing. The traditional approach to information sharing, characte...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...
SIGCOMM
2010
ACM
13 years 8 months ago
capDL: a language for describing capability-based systems
Capabilities provide an access control model that can be used to construct systems where safety of protection can be precisely determined. However, in order to be certain of the s...
Ihor Kuz, Gerwin Klein, Corey Lewis, Adam Walker
IUI
2009
ACM
14 years 5 months ago
Data-driven exploration of musical chord sequences
We present data-driven methods for supporting musical creativity by capturing the statistics of a musical database. Specifically, we introduce a system that supports users in expl...
Eric Nichols, Dan Morris, Sumit Basu
INFOCOM
2007
IEEE
14 years 2 months ago
Service Time Approximation in IEEE 802.11 Single-Hop Ad-hoc Networks
Abstract— This paper investigates the near-memoryless behavior of the service time for IEEE 802.11 saturated single-hop ad hoc networks. We show that the number of packets succes...
Atef Abdrabou, Weihua Zhuang
ASWEC
2006
IEEE
14 years 2 months ago
Formal Verification of the IEEE 802.11i WLAN Security Protocol
With the increased usage of wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. The latest WLAN security pr...
Elankayer Sithirasenan, Saad Zafar, Vallipuram Mut...