Sciweavers

141 search results - page 27 / 29
» Type Based Discretionary Access Control
Sort
View
GLOBECOM
2010
IEEE
13 years 3 months ago
SplitAP: Leveraging Wireless Network Virtualization for Flexible Sharing of WLANs
Providing air-time guarantees across a group of clients forms a fundamental building block in sharing an access point (AP) across different virtual network providers. Though this p...
Gautam D. Bhanage, Dipti Vete, Ivan Seskar, Dipank...
GRID
2007
Springer
13 years 12 months ago
Resource usage policy expression and enforcement in grid computing
-- To date, not enough attention has been paid to issues surrounding the description and enforcement of policies for controlling Grid resources. These policies define the permitted...
Jun Feng, Glenn S. Wasson, Marty Humphrey
DIMVA
2010
13 years 7 months ago
HookScout: Proactive Binary-Centric Hook Detection
Abstract. In order to obtain and maintain control, kernel malware usually makes persistent control flow modifications (i.e., installing hooks). To avoid detection, malware develope...
Heng Yin, Pongsin Poosankam, Steve Hanna, Dawn Xia...
SIGMOD
1997
ACM
166views Database» more  SIGMOD 1997»
13 years 10 months ago
The InfoSleuth Project
The goal of the InfoSleuth project at MCC is to exploit and synthesize new technologies into a uni ed system that retrieves and processes information in an ever-changing network o...
Roberto J. Bayardo Jr., William Bohrer, Richard S....
INFOCOM
2005
IEEE
13 years 11 months ago
Multicast capacity of packet-switched ring WDM networks
Packet-switched unidirectional and bidirectional ring wavelength division multiplexing (WDM) networks with destination stripping provide an increased capacity due to spatial wavel...
Michael Scheutzow, Patrick Seeling, Martin Maier, ...