Sciweavers

CODASPY
2012
12 years 8 days ago
Deriving implementation-level policies for usage control enforcement
Usage control is concerned with how data is used after access to it has been granted. As such, it is particularly relevant to end users who own the data. System implementations of...
Prachi Kumari, Alexander Pretschner
EUROPAR
2011
Springer
12 years 4 months ago
Benchmarking Grid Information Systems
Abstract. Grid information systems play a central role in today’s production Grid infrastructures, enabling the discovery of a range of information about the Grid services that e...
Laurence Field, Rizos Sakellariou
IJSEKE
2011
165views more  IJSEKE 2011»
12 years 8 months ago
Model Checking for Verification of Mandatory Access Control Models and Properties
rather wide gap in abstraction between policies and mechanisms. In this paper, we propose a general approach for property verification for MAC models. The approach defines a stan...
Vincent C. Hu, D. Richard Kuhn, Tao Xie, JeeHyun H...
CISS
2010
IEEE
12 years 8 months ago
Concentration of measure for block diagonal matrices with repeated blocks
Abstract—The theoretical analysis of randomized compressive operators often relies on the existence of a concentration of measure inequality for the operator of interest. Though ...
Christopher J. Rozell, Han Lun Yap, Jae Young Park...