Sciweavers

315 search results - page 41 / 63
» Specifying multimedia access control using RDF
Sort
View
TASE
2007
IEEE
14 years 1 months ago
Constraint-Based Policy Negotiation and Enforcement for Telco Services
Telco services are evolving under several aspects: for instance, services may combine different telecommunication features (messaging, multi-media, etc.) and may be activated and...
Maria Grazia Buscemi, Laura Ferrari, Corrado Moiso...
NOMS
2000
IEEE
125views Communications» more  NOMS 2000»
13 years 11 months ago
A distributed resource controller for QoS applications
The Distributed Resource Controller (DRC) technology described in this paper provides a novel approach to interfacing applications with emerging network mechanisms to deliver Qual...
Phil Wang, Yechiam Yemini, Danilo Florissi, John A...
ICSE
2010
IEEE-ACM
14 years 5 days ago
Views: object-inspired concurrency control
We present views, a new approach to controlling concurrency. Fine-grained locking is often necessary to increase concurrency. Correctly implementing fine-grained locking with tod...
Brian Demsky, Patrick Lam
MMSEC
2004
ACM
104views Multimedia» more  MMSEC 2004»
14 years 24 days ago
Key-assignment strategies for CPPM
CSS, the first system to protect multimedia content on the new DVD medium failed badly, because both its encryption algorithm and its key management could easily be broken. A new ...
André Adelsbach, Jörg Schwenk
ESORICS
2000
Springer
13 years 11 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud