Sciweavers

SASO
2015
IEEE
8 years 24 days ago
Increasing Information in Socio-Technical MAS Considered Contentious
—Socio-technical systems differ from typical MAS formulations in that efficiency of the system is not the only concern of the participating agents. Human attributes such as conc...
Vivek Nallur, Julien Monteil, Tyler Sammons, M&eac...
SACMAT
2015
ACM
8 years 24 days ago
Preventing Information Inference in Access Control
Technological innovations like social networks, personal devices and cloud computing, allow users to share and store online a huge amount of personal data. Sharing personal data o...
Federica Paci, Nicola Zannone
SACMAT
2015
ACM
8 years 24 days ago
Mitigating Multi-Tenancy Risks in IaaS Cloud Through Constraints-Driven Virtual Resource Scheduling
A major concern in the adoption of cloud infrastructure-asa-service (IaaS) arises from multi-tenancy, where multiple tenants share the underlying physical infrastructure operated ...
Khalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu
SACMAT
2015
ACM
8 years 24 days ago
On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval
Attribute Based Access Control (ABAC) is becoming the reference model for the specification and evaluation of access control policies. In ABAC policies and access requests are de...
Jason Crampton, Charles Morisset, Nicola Zannone
SACMAT
2015
ACM
8 years 24 days ago
Towards Attribute-Based Authorisation for Bidirectional Programming
Bidirectional programming allows developers to write programs that will produce transformations that extract data from a source document into a view. The same transformations can ...
Lionel Montrieux, Zhenjiang Hu
SACMAT
2015
ACM
8 years 24 days ago
Federated Access Management for Collaborative Network Environments: Framework and Case Study
With the advent of various collaborative sharing mechanisms such as Grids, P2P and Clouds, organizations including private and public sectors have recognized the benefits of bein...
Carlos E. Rubio-Medrano, Ziming Zhao, Adam Doup&ea...
SACMAT
2015
ACM
8 years 24 days ago
A Logical Approach to Restricting Access in Online Social Networks
Nowadays in popular online social networks users can blacklist some of their friends in order to disallow them to access resources that other non-blacklisted friends may access. W...
Marcos Cramer, Jun Pang, Yang Zhang
SACMAT
2015
ACM
8 years 24 days ago
Relationship-Based Access Control for an Open-Source Medical Records System
Inspired by the access control models of social network systems, Relationship-Based Access Control (ReBAC) was recently proposed as a general-purpose access control paradigm for a...
Syed Zain R. Rizvi, Philip W. L. Fong, Jason Cramp...
SACMAT
2015
ACM
8 years 24 days ago
Commune: Shared Ownership in an Agnostic Cloud
Cloud storage platforms promise a convenient way for users to share files and engage in collaborations, yet they require all files to have a single owner who unilaterally makes ...
Claudio Soriente, Ghassan O. Karame, Hubert Ritzdo...
RTSS
2015
IEEE
8 years 24 days ago
Precise Multi-level Inclusive Cache Analysis for WCET Estimation
Abstract—Multi-level inclusive caches are often used in multicore processors to simplify the design of cache coherence protocol. However, the use of such cache hierarchies poses ...
Zhenkai Zhang, Xenofon D. Koutsoukos