Sciweavers

83 search results - page 15 / 17
» Verified enforcement of stateful information release policie...
Sort
View
TOPNOC
2010
13 years 1 months ago
On-the-Fly Auditing of Business Processes
Information systems supporting business process are mostly very complex. If we have to ensure that certain business rules are enforced in a business process, it is often easier to ...
Kees M. van Hee, Jan Hidders, Geert-Jan Houben, Ja...
DOA
2001
94views more  DOA 2001»
13 years 8 months ago
How to Monitor and Control Resource Usage in Mobile Agent Systems
The Mobile Agent technology has already shown its advantages, but at the same time has already remarked new problems currently limiting its diffusion in commercial environments. A...
Paolo Bellavista, Antonio Corradi, Cesare Stefanel...
JSAC
2007
98views more  JSAC 2007»
13 years 6 months ago
Optimum Power Allocation for Single-User MIMO and Multi-User MIMO-MAC with Partial CSI
Abstract— We consider both the single-user and the multiuser power allocation problems in MIMO systems, where the receiver side has the perfect channel state information (CSI), a...
Alper Soysal, Sennur Ulukus
SACMAT
2009
ACM
14 years 1 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
SIGMOD
2004
ACM
198views Database» more  SIGMOD 2004»
14 years 6 months ago
Secure XML Querying with Security Views
The prevalent use of XML highlights the need for a generic, flexible access-control mechanism for XML documents that supports efficient and secure query access, without revealing ...
Wenfei Fan, Chee Yong Chan, Minos N. Garofalakis