Sciweavers

1316 search results - page 5 / 264
» A Computational Approach to Compare Information Revelation P...
Sort
View
CCS
2009
ACM
15 years 10 months ago
D-algebra for composing access control policy decisions
This paper proposes a D-algebra to compose decisions from multiple access control policies. Compared to other algebrabased approaches aimed at policy composition, D-algebra is the...
Qun Ni, Elisa Bertino, Jorge Lobo
DSOM
2006
Springer
15 years 1 months ago
Conflict Prevention Via Model-Driven Policy Refinement
This paper describes an approach for application specific conflict prevention based on model-driven refinement of policies prior to deployment. Central to the approach is an algori...
Steven Davy, Brendan Jennings, John Strassner
NDSS
2009
IEEE
15 years 4 months ago
Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems
Host compromise is a serious computer security problem today. To better protect hosts, several Mandatory Access Control systems, such as Security Enhanced Linux (SELinux) and AppA...
Hong Chen, Ninghui Li, Ziqing Mao
ETFA
2005
IEEE
15 years 3 months ago
LEF closed-loop scheduling policy for real-time control systems
Today there is a significant body of results of resource management in real-time systems. However, most of them are based on "open-loop" strategies and techniques that do...
J. Yepez, Pau Martí, J. Ayza, Josep M. Fuer...
57
Voted
SC
2009
ACM
15 years 4 months ago
Evaluating the impact of inaccurate information in utility-based scheduling
Proponents of utility-based scheduling policies have shown the potential for a 100–1400% increase in value-delivered to users when used in lieu of traditional approaches such as...
Alvin AuYoung, Amin Vahdat, Alex C. Snoeren