Sciweavers

20 search results - page 2 / 4
» View-Based Access Control with High Assurance
Sort
View
ICSE
2007
IEEE-ACM
14 years 5 months ago
Testing and Analysis of Access Control Policies
Policy testing and analysis are important techniques for high assurance of correct specification of access control policies. We propose a set of testing and analysis techniques fo...
Evan Martin
TMC
2008
132views more  TMC 2008»
13 years 5 months ago
A Cross-Layer Approach for Per-Station Fairness in TCP over WLANs
In this paper, we investigate the issue of per-station fairness in TCP over IEEE 802.11-compliant wireless local area networks (WLANs), especially in Wi-Fi hot spots. It is asserte...
Eun-Chan Park, Dong-Young Kim, Hwangnam Kim, Chong...
NETWORK
2007
145views more  NETWORK 2007»
13 years 4 months ago
Analysis of Shared Memory Priority Queues with Two Discard Levels
— Two rate SLAs become increasingly popular in today’s Internet, allowing a customer to save money by paying one price for committed traffic and a much lower price for additio...
Shlomi Bergida, Yuval Shavitt
USS
2004
13 years 6 months ago
Design of the EROS Trusted Window System
Window systems are the primary mediator of user input and output in modern computing systems. They are also a commonly used interprocess communication mechanism. As a result, they...
Jonathan S. Shapiro, John Vanderburgh, Eric Northu...
HASE
2008
IEEE
13 years 11 months ago
Low Cost Secure Computation for the General Client-Server Computation Model
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
Liangliang Xiao, I-Ling Yen, Farokh B. Bastani