Sciweavers

883 search results - page 65 / 177
» An Access Control Model Based on Distributed Knowledge Manag...
Sort
View
107
Voted
VTC
2007
IEEE
121views Communications» more  VTC 2007»
15 years 7 months ago
Downlink Traffic Power Characterization for Multi-Rate Wireless CDMA Data Networks
— The characterization of downlink traffic power is an important issue for the design of efficient call admission control (CAC) and radio resource management (RRM) procedures. In...
Ashraf S. Hasan Mahmoud
ICDCS
2000
IEEE
15 years 5 months ago
Highly Concurrent Shared Storage
1 Switched system-area networks enable thousands of storage devices to be shared and directly accessed by end hosts, promising databases and filesystems highly scalable, reliable ...
Khalil Amiri, Garth A. Gibson, Richard A. Golding
85
Voted
POLICY
2004
Springer
15 years 6 months ago
Policy-Based Autonomic Control Service
Recently, there has been a considerable interest in policy-based, goal-oriented service management and autonomic computing. Much work is still required to investigate designs and ...
N. Badr, A. Taleb-Bendiab, D. Reilly
SACMAT
2003
ACM
15 years 5 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
118
Voted
SACMAT
2003
ACM
15 years 5 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf