Sciweavers

311 search results - page 56 / 63
» Administration in role-based access control
Sort
View
CORR
2010
Springer
168views Education» more  CORR 2010»
14 years 9 months ago
Network evolution and QOS provisioning for integrated femtocell/macrocell networks
Integrated femtocell/macrocell networks, comprising a conventional cellular network overlaid with femtocells, offer an economically appealing way to improve coverage, quality of s...
Mostafa Zaman Chowdhury, Yeong Min Jang, Zygmunt J...
ICSE
2005
IEEE-ACM
15 years 9 months ago
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...
VIZSEC
2007
Springer
15 years 3 months ago
Visualizing Network Security Events Using Compound Glyphs from a Service-Oriented Perspective
ct Network security is the complicated field of controlling access within a computer network. One of the difficulties in network security is detecting the presence, severity, and ...
Jason Pearlman, Penny Rheingans
SIGCOMM
1994
ACM
15 years 1 months ago
Making Greed Work in Networks: A Game-Theoretic Analysis of Switch Service Disciplines
This paper discusses congestion control from a game-theoretic perspective. There are two basic premises: (1) users are assumed to be independent and sel sh, and (2) central admini...
Scott Shenker
USS
2008
14 years 12 months ago
Verifying Compliance of Trusted Programs
In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe ...
Sandra Rueda, Dave King 0002, Trent Jaeger