Sciweavers

229 search results - page 28 / 46
» Set Covering Problems in Role-Based Access Control
Sort
View
ITICSE
2004
ACM
14 years 1 months ago
Teaching operating systems administration with user mode linux
User Mode Linux is a virtual machine running on a GNULinux operating system. It is the right choice for teaching operating systems’ administration, as it does not need any dedic...
Renzo Davoli
CCS
2009
ACM
14 years 2 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino
ICDE
2008
IEEE
132views Database» more  ICDE 2008»
14 years 9 months ago
Auditing SQL Queries
We study the problem of auditing a batch of SQL queries: Given a forbidden view of a database that should have been kept confidential, a batch of queries that were posed over this ...
Rajeev Motwani, Shubha U. Nabar, Dilys Thomas
ICC
2007
IEEE
14 years 2 months ago
Satisfying Elastic Short Term Fairness in High Throughput Wireless Communication Systems with Multimedia Services
Abstract—In this paper we study the problem of providing shortterm access time fairness in wireless communication systems with multimedia services, while still maintaining high s...
Timotheos Kastrinogiannis, Symeon Papavassiliou
WOWMOM
2006
ACM
135views Multimedia» more  WOWMOM 2006»
14 years 1 months ago
MCMSDA: A Multi-Channel Multi-Sector Directional Antenna Wireless LAN
Recently there is an increasing interest in using directional antennas and multi-channel for Ad-hoc wireless networks. Directional antennas provide higher capacity and less multi-...
Yong Huang, Weibo Gong, Dev Gupta