Sciweavers

315 search results - page 41 / 63
» Specifying multimedia access control using RDF
Sort
View
136
Voted
TASE
2007
IEEE
15 years 9 months ago
Constraint-Based Policy Negotiation and Enforcement for Telco Services
Telco services are evolving under several aspects: for instance, services may combine different telecommunication features (messaging, multi-media, etc.) and may be activated and...
Maria Grazia Buscemi, Laura Ferrari, Corrado Moiso...
128
Voted
NOMS
2000
IEEE
125views Communications» more  NOMS 2000»
15 years 7 months ago
A distributed resource controller for QoS applications
The Distributed Resource Controller (DRC) technology described in this paper provides a novel approach to interfacing applications with emerging network mechanisms to deliver Qual...
Phil Wang, Yechiam Yemini, Danilo Florissi, John A...
ICSE
2010
IEEE-ACM
15 years 7 months ago
Views: object-inspired concurrency control
We present views, a new approach to controlling concurrency. Fine-grained locking is often necessary to increase concurrency. Correctly implementing fine-grained locking with tod...
Brian Demsky, Patrick Lam
114
Voted
MMSEC
2004
ACM
104views Multimedia» more  MMSEC 2004»
15 years 8 months ago
Key-assignment strategies for CPPM
CSS, the first system to protect multimedia content on the new DVD medium failed badly, because both its encryption algorithm and its key management could easily be broken. A new ...
André Adelsbach, Jörg Schwenk
135
Voted
ESORICS
2000
Springer
15 years 6 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud