Sciweavers

2335 search results - page 50 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
136
Voted
SACMAT
2009
ACM
15 years 9 months ago
Trojan horse resistant discretionary access control
Modern operating systems primarily use Discretionary Access Control (DAC) to protect files and other operating system resources. DAC mechanisms are more user-friendly than Mandat...
Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang
IEEEARES
2008
IEEE
15 years 9 months ago
Effective Monitoring of a Survivable Distributed Networked Information System
In 2002, DARPA put together a challenging proposition to the research community: demonstrate using an existing information system and available DARPA developed and other COTS tech...
Paul Rubel, Michael Atighetchi, Partha Pratim Pal,...
126
Voted
TISSEC
2010
142views more  TISSEC 2010»
14 years 9 months ago
A logical specification and analysis for SELinux MLS policy
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...
CDC
2010
IEEE
124views Control Systems» more  CDC 2010»
14 years 9 months ago
Deployment of drifters in a piecewise-constant flow environment
We study a deployment strategy for a group of vehicles that drift in an ambient flow field. Specifically, we address the case where the flow is always greater in magnitude than an ...
Andrew Kwok, Sonia Martínez
109
Voted
AGENTS
1997
Springer
15 years 6 months ago
Challenger: A Multi-agent System for Distributed Resource Allocation
In this paper we introduce Challenger, a multiagent system that performs completely distributed resource allocation. Challenger consists of agents which individually manage local ...
Anthony Chavez, Alexandros Moukas, Pattie Maes