Sciweavers

670 search results - page 114 / 134
» A RBAC-Based Policy Information Base
Sort
View
104
Voted
CDC
2009
IEEE
118views Control Systems» more  CDC 2009»
15 years 6 months ago
Opportunistic scheduling in cellular systems in the presence of non-cooperative mobiles
Abstract— A central scheduling problem in wireless communications is that of allocating resources to one of many mobile stations that have a common radio channel. Much attention ...
Kavitha Veeraruna, Eitan Altman, Rachid El Azouzi,...
176
Voted
VLDB
2007
ACM
295views Database» more  VLDB 2007»
15 years 7 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
CADE
2008
Springer
16 years 2 months ago
Precise Dynamic Verification of Confidentiality
Confidentiality is maybe the most popular security property to be formally or informally verified. Noninterference is a baseline security policy to formalize confidentiality of sec...
Gurvan Le Guernic
CHI
2010
ACM
15 years 8 months ago
Communicating software agreement content using narrative pictograms
This paper presents narrative pictograms, diagrams designed to convey the abstract concepts of a software agreement. Narrative pictograms arose out of a need to increase the chanc...
Matthew Kay, Michael Terry
146
Voted
PCI
2005
Springer
15 years 7 months ago
A Graphical Rule Authoring Tool for Defeasible Reasoning in the Semantic Web
Defeasible reasoning is a rule-based approach for efficient reasoning with incomplete and inconsistent information. Such reasoning is useful for many applications in the Semantic W...
Nick Bassiliades, Efstratios Kontopoulos, Grigoris...