Sciweavers

1150 search results - page 60 / 230
» Specifying Information-Flow Controls
Sort
View
CHI
1993
ACM
14 years 1 months ago
Relativity controller: reflecting user perspective in document spaces
As the ease of accessing and generating large quantities of information increases, people’s ability to navigate through that information and maintain personal perspective decrea...
Eric Justin Gould
ICWS
2007
IEEE
13 years 10 months ago
A Situation-aware Access Control based Privacy-Preserving Service Matchmaking Approach for Service-Oriented Architecture
Service matchmaking is an important process in the operation of Service-Oriented Architecture (SOA) based systems. In this process, information from both service providers and req...
Stephen S. Yau, Junwei Liu
CCR
2006
92views more  CCR 2006»
13 years 9 months ago
A cooperative uplink power control scheme for elastic data services in wireless CDMA systems
We consider the uplink power control problem in a single cell CDMA wireless data system. Each user specifies upper and lower QoS bounds. We formulate the considered problem as a g...
George Alyfantis, Stathes Hadjiefthymiades, Lazaro...
CCR
1999
64views more  CCR 1999»
13 years 9 months ago
TCP congestion control with a misbehaving receiver
In this paper, we explore the operation of TCP congestion control when the receiver can misbehave, as might occur with a greedy Web client. We first demonstrate that there are sim...
Stefan Savage, Neal Cardwell, David Wetherall, Tom...
FASE
2010
Springer
13 years 7 months ago
A Verifiable Modeling Approach to Configurable Role-Based Access Control
Role-based access control (RBAC) is a popular access control model for enterprise systems due to its economic benefit and scalability. There are many RBAC features available, each ...
Dae-Kyoo Kim, Lunjin Lu, Sangsig Kim