Sciweavers

581 search results - page 6 / 117
» policy 2009
Sort
View
CHI
2009
ACM
14 years 9 months ago
Real life challenges in access-control management
In this work we ask the question: what are the challenges of managing a physical or file system access-control policy for a large organization? To answer the question, we conducte...
Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder,...
ICPPW
2009
IEEE
14 years 3 months ago
The Owner Share Scheduler for a Distributed System
Abstract—In large distributed systems, where shared resources are owned by distinct entities, there is a need to reflect resource ownership in resource allocation. An appropriat...
Jose Nelson Falavinha Junior, Aleardo Manacero Jun...
CSREASAM
2009
13 years 9 months ago
Incremental Information Flow Analysis of Role Based Access Control
Role-Based Access Control (RBAC) has been widely used for expressing access control policies. Although RBAC provides flexible mechanisms to control the access to information, it do...
Mikhail I. Gofman, Ruiqi Luo, Jian He, Yingbin Zha...
NETCOOP
2009
Springer
14 years 3 months ago
Competition and Cooperation between Nodes in Delay Tolerant Networks with Two Hop Routing
This paper revisits the two-hop forwarding policy in delay tolerant networks (DTNs) using simple probabilistic arguments. Closed form expressions are derived for the main performan...
Eitan Altman
EDOC
2009
IEEE
14 years 3 months ago
Modelling and Reasoning Languages for Social Networks Policies
—Policy languages (such as privacy and rights) have had little impact on the wider community. Now that Social Networks have taken off, the need to revisit Policy languages and re...
Guido Governatori, Renato Iannella