Sciweavers

231 search results - page 12 / 47
» Working set-based access control for network file systems
Sort
View
SACMAT
2003
ACM
14 years 1 months ago
An access control model for dynamic client-side content
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...
Adam Hess, Kent E. Seamons
POLICY
2004
Springer
14 years 1 months ago
Cassandra: Distributed Access Control Policies with Tunable Expressiveness
We study the specification of access control policy in large-scale distributed systems. Our work on real-world policies has shown that standard policy idioms such as role hierarc...
Moritz Y. Becker, Peter Sewell
ITICSE
2004
ACM
14 years 2 months ago
Teaching operating systems administration with user mode linux
User Mode Linux is a virtual machine running on a GNULinux operating system. It is the right choice for teaching operating systems’ administration, as it does not need any dedic...
Renzo Davoli
ICISC
2004
127views Cryptology» more  ICISC 2004»
13 years 10 months ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
EMSOFT
2008
Springer
13 years 10 months ago
Wireless channel access reservation for embedded real-time systems
Reservation-based channel access has been shown to be effective in providing Quality of Service (QoS) guarantees (e.g., timeliness) in wireless embedded real-time applications suc...
Dinesh Rajan, Christian Poellabauer, Xiaobo Sharon...