Sciweavers

167 search results - page 34 / 34
» An Application Framework for TCP IP Applications
Sort
View
SACMAT
2009
ACM
13 years 12 months ago
Dynamic mandatory access control for multiple stakeholders
In this paper, we present a mandatory access control system that uses input from multiple stakeholders to compose policies based on runtime information. In the emerging ubiquitous...
Vikhyath Rao, Trent Jaeger
KDD
2010
ACM
247views Data Mining» more  KDD 2010»
13 years 7 months ago
Metric forensics: a multi-level approach for mining volatile graphs
Advances in data collection and storage capacity have made it increasingly possible to collect highly volatile graph data for analysis. Existing graph analysis techniques are not ...
Keith Henderson, Tina Eliassi-Rad, Christos Falout...