Sciweavers

692 search results - page 22 / 139
» Shamon: A System for Distributed Mandatory Access Control
Sort
View
IEEEARES
2010
IEEE
14 years 19 days ago
LSM-Based Secure System Monitoring Using Kernel Protection Schemes
—Monitoring a process and its file I/O behaviors is important for security inspection for a data center server against intrusions, malware infection and information leakage. In ...
Takamasa Isohara, Keisuke Takemori, Yutaka Miyake,...
HPDC
2002
IEEE
14 years 8 days ago
A Secure Distributed Search System
This paper presents the design, implementationand evaluation of Mingle, a secure distributed search system. Each participatinghost runs a Mingle server, which maintains an inverte...
Yinglian Xie, David R. O'Hallaron, Michael K. Reit...
ECEASST
2008
106views more  ECEASST 2008»
13 years 7 months ago
Controlling resource access in Directed Bigraphs
: We study directed bigraph with negative ports, a bigraphical framework for representing models for distributed, concurrent and ubiquitous computing. With respect to previous vers...
Davide Grohmann, Marino Miculan
TWC
2010
13 years 2 months ago
Dynamic Spectrum Access Using a Network Coded Cognitive Control Channel
In this paper we propose a Dynamic Spectrum Access scheme which allows the users to opportunistically and efficiently access the channels available for communications. It addresses...
Nicola Baldo, Alfred Asterjadhi, Michele Zorzi
JSAC
2011
167views more  JSAC 2011»
13 years 2 months ago
Decentralized Cognitive Radio Control Based on Inference from Primary Link Control Information
This work on cognitive radio access ventures beyond the more traditional “listen-before-talk” paradigm that underlies many cognitive radio access proposals. We exploit the bi-...
Senhua Huang, Xin Liu, Zhi Ding