Sciweavers

807 search results - page 49 / 162
» Term Rewriting for Access Control
Sort
View
CCS
2005
ACM
15 years 9 months ago
PeerAccess: a logic for distributed authorization
This paper introduces the PeerAccess framework for reasoning about authorization in open distributed systems, and shows how a parameterization of the framework can be used to reas...
Marianne Winslett, Charles C. Zhang, Piero A. Bona...
NSDI
2008
15 years 6 months ago
Ad-hoc Guesting: When Exceptions Are the Rule
People's work days are filled with exceptions to normal routine. These exceptions affect the security and privacy of their information access and sharing. In a recent ethnogr...
Brinda Dalal, Les Nelson, Diana K. Smetters, Natha...
CSREAEEE
2006
110views Business» more  CSREAEEE 2006»
15 years 5 months ago
Network-in Quality the E-Business
Recent advances in user access technology enables the delivery of Network multicast to residential users. In order for such a service to be successful, efficient management must b...
Kaiquan Chen
143
Voted
CLOUD
2010
ACM
15 years 8 months ago
G-Store: a scalable data store for transactional multi key access in the cloud
Cloud computing has emerged as a preferred platform for deploying scalable web-applications. With the growing scale of these applications and the data associated with them, scalab...
Sudipto Das, Divyakant Agrawal, Amr El Abbadi
138
Voted
JSAC
2010
138views more  JSAC 2010»
15 years 2 months ago
Dynamic conjectures in random access networks using bio-inspired learning
—Inspired by the biological entities’ ability to achieve reciprocity in the course of evolution, this paper considers a conjecture-based distributed learning approach that enab...
Yi Su, Mihaela van der Schaar