Sciweavers

1587 search results - page 74 / 318
» Access Control for Shared Resources
Sort
View
103
Voted
COMPSEC
2008
116views more  COMPSEC 2008»
15 years 19 days ago
Enforcing memory policy specifications in reconfigurable hardware
While general-purpose processor based systems are built to enforce memory protection to prevent the unintended sharing of data between processes, current systems built around reco...
Ted Huffmire, Timothy Sherwood, Ryan Kastner, Timo...
132
Voted
INFOCOM
2012
IEEE
13 years 3 months ago
Truthful prioritization schemes for spectrum sharing
Abstract—As the rapid expansion of smart phones and associated data-intensive applications continues, we expect to see renewed interest in dynamic prioritization schemes as a way...
Victor Shnayder, Jeremy Hoon, David C. Parkes, Vik...
GRID
2005
Springer
15 years 6 months ago
Policy administration control and delegation using XACML and Delegent
Abstract— In this paper we present a system permitting controlled policy administration and delegation using the XACML access control system. The need for these capabilities stem...
Ludwig Seitz, Erik Rissanen, Thomas Sandholm, Baba...
107
Voted
IEEEARES
2007
IEEE
15 years 6 months ago
Context-Dependent Access Control for Contextual Information
Abstract— Following Mark Weiser’s vision of ubiquitous computing and calm technology, computer systems should run in the background, preferably without the user noticing it at ...
Christin Groba, Stephan Grob, Thomas Springer
94
Voted
CIKM
2005
Springer
15 years 6 months ago
A function-based access control model for XML databases
XML documents are frequently used in applications such as business transactions and medical records involving sensitive information. Typically, parts of documents should be visibl...
Naizhen Qi, Michiharu Kudo, Jussi Myllymaki, Hamid...