Sciweavers

807 search results - page 86 / 162
» Term Rewriting for Access Control
Sort
View
132
Voted
NOSSDAV
2005
Springer
15 years 9 months ago
Interactive media server with media synchronized RAID storage system
We propose an efficient placement algorithm and per-disk prefetching method to effectively support interactive operations in the media server. Our placement policy is incorporate...
Seung Ho Lim, Yo-Won Jeong, Kyu Ho Park
140
Voted
CCS
2000
ACM
15 years 8 months ago
Implementing a distributed firewall
Conventional firewalls rely on topology restrictions and controlled network entry points to enforce traffic filtering. Furthermore, a firewall cannot filter traffic it does ...
Sotiris Ioannidis, Angelos D. Keromytis, Steven M....
111
Voted
CCS
2008
ACM
15 years 5 months ago
Asynchronous policy evaluation and enforcement
Evaluating and enforcing policies in large-scale networks is one of the most challenging and significant problems facing the network security community today. Current solutions ar...
Matthew Burnside, Angelos D. Keromytis
IJVR
2006
178views more  IJVR 2006»
15 years 3 months ago
Scene Synchronization in Close Coupled World Representations Using SCIVE
This paper introduces SCIVE, a Simulation Core for Intelligent Virtual Environments. SCIVE provides a Knowledge Representation Layer (KRL) as a central organizing struc...
Marc Erich Latoschik, Christian Fröhlich, Ale...
129
Voted
SACMAT
2010
ACM
15 years 1 months ago
Role mining based on weights
Role mining from the existing permissions has been widely applied to aid the process of migrating to an RBAC system. While all permissions are treated evenly in previous approache...
Xiaopu Ma, Ruixuan Li, Zhengding Lu