Sciweavers

72 search results - page 8 / 15
» Towards a Mechanism for Discretionary Overriding of Access C...
Sort
View
ECIS
2000
13 years 9 months ago
Towards a Secure Web-Based Health Care Application
Even though security requirements in health care are traditionally high, most computerized health care applications lack sophisticated security measures or focus only on single sec...
Susanne Röhrig, Konstantin Knorr
GLOBECOM
2006
IEEE
14 years 1 months ago
Analysis of Unfairness between TCP Uplink and Downlink Flows in Wi-Fi Hot Spots
Abstract— This paper focuses on the unfairness problem between TCP uplink and downlink flows in the 802.11 Wi-Fi hot spots and shows that the service is prone to be unfair. The ...
Eun-Chan Park, Dong-Young Kim, Chong-Ho Choi
COLCOM
2009
IEEE
14 years 8 days ago
Building a stateful reference monitor with coloured petri nets
The need for collaboration and information sharing has been recently growing dramatically with the convergence of outsourcing and offshoring, the increasing need to cut costs thro...
Basel Katt, Michael Hafner, Xinwen Zhang
ACSAC
2006
IEEE
14 years 1 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
GECON
2008
Springer
152views Business» more  GECON 2008»
13 years 8 months ago
The Power of Preemption in Economic Online Markets
Abstract. In distributed computer networks where resources are under decentralized control, selfish users will generally not work towards one common goal, such as maximizing the o...
Lior Amar, Ahuva Mu'alem, Jochen Stößer