Sciweavers

20 search results - page 4 / 4
» View-Based Access Control with High Assurance
Sort
View
WCE
2007
13 years 6 months ago
Dynamic Traffic Regulation for WiFi Networks
— Multimedia applications require high bandwidth in order to assure certain level of Quality of Service (QoS). It is well known that the characteristics of the traffic for multim...
Domingo Marrero Marrero, Elsa María Mac&iac...
CCS
2008
ACM
13 years 7 months ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...
ITICSE
2009
ACM
13 years 11 months ago
Xen worlds: leveraging virtualization in distance education
The Xen Worlds project at Iowa State University was designed to provide a virtualized lab environment for the Information Assurance program. The large number of off-campus student...
Benjamin R. Anderson, Amy K. Joines, Thomas E. Dan...
MICRO
2009
IEEE
129views Hardware» more  MICRO 2009»
13 years 12 months ago
Execution leases: a hardware-supported mechanism for enforcing strong non-interference
High assurance systems such as those found in aircraft controls and the financial industry are often required to handle a mix of tasks where some are niceties (such as the contro...
Mohit Tiwari, Xun Li, Hassan M. G. Wassel, Frederi...
ACSAC
2005
IEEE
13 years 11 months ago
Intrusion Detection in RBAC-administered Databases
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance security and privacy. An important componen...
Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athen...