Sciweavers

2335 search results - page 51 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
118
Voted
CDC
2008
IEEE
193views Control Systems» more  CDC 2008»
15 years 2 months ago
Admission control and routing in multi-hop wireless networks
To enable services such as streaming multimedia and voice in multi-hop wireless networks it is necessary to develop algorithms that guarantee Quality of Service (QoS). In this pape...
Juan José Jaramillo, R. Srikant
112
Voted
WSC
2001
15 years 4 months ago
Improving simulation model adaptability with a production control framework
Simulation models provide a powerful tool for the analysis of manufacturing systems, but their utility beyond the design stage of the system life cycle is hampered by the high cos...
Sean M. Gahagan, Jeffrey W. Herrmann
SECURWARE
2008
IEEE
15 years 9 months ago
Security Patterns for Capturing Encryption-Based Access Control to Sensor Data
—A security pattern describes a particular recurring security problem that arises in specific contexts, and presents a well-proven generic solution for it [1]. This paper descri...
Ángel Cuevas, Paul El Khoury, Laurent Gomez...
144
Voted
IFIP
2010
Springer
14 years 9 months ago
Cryptographic Enforcement of Role-Based Access Control
Many cryptographic schemes have been designed to enforce information flow policies. However, enterprise security requirements are often better encoded, or can only be encoded, usin...
Jason Crampton
136
Voted
CCS
2006
ACM
15 years 6 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch