Sciweavers

807 search results - page 85 / 162
» Term Rewriting for Access Control
Sort
View
135
Voted
SYSTOR
2009
ACM
15 years 10 months ago
DHIS: discriminating hierarchical storage
A typical storage hierarchy comprises of components with varying performance and cost characteristics, providing multiple options for data placement. We propose and evaluate a hie...
Chaitanya Yalamanchili, Kiron Vijayasankar, Erez Z...
143
Voted
SACMAT
2003
ACM
15 years 8 months ago
Cooperative role-based administration
In large organizations the administration of access privileges (such as the assignment of an access right to a user in a particular role) is handled cooperatively through distribu...
Horst Wedde, Mario Lischka
150
Voted
MSWIM
2005
ACM
15 years 9 months ago
A controlled-access scheduling mechanism for QoS provisioning in IEEE 802.11e wireless LANs
Wireless Local Area Networks (WLAN) are being deployed at a rapid pace and in different environments. As a result, the demand for supporting a diverse range of applications over w...
Yaser Pourmohammadi Fallah, Hussein M. Alnuweiri
141
Voted
ACSAC
2010
IEEE
15 years 1 months ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...
SAC
2010
ACM
15 years 10 months ago
Analysis of collision probability in unsaturated situation
A large number of the MAC protocols proposed for establishing wireless sensor networks are based on the 802.11 standard. The trade-off in these protocols is the control packet ov...
Qian Dong, Waltenegus Dargie