Sciweavers

948 search results - page 35 / 190
» Analysis of SITA policies
Sort
View
CCS
2009
ACM
15 years 10 months ago
D-algebra for composing access control policy decisions
This paper proposes a D-algebra to compose decisions from multiple access control policies. Compared to other algebrabased approaches aimed at policy composition, D-algebra is the...
Qun Ni, Elisa Bertino, Jorge Lobo
IEEEARES
2010
IEEE
15 years 2 months ago
Supporting Authorization Policy Modification in Agile Development of Web Applications
Web applications are increasingly developed in Agile development processes. Business-centric Web applications need complex authorization policies to securely implement business pro...
Steffen Bartsch
ASPLOS
1991
ACM
15 years 1 months ago
NUMA Policies and Their Relation to Memory Architecture
Multiprocessor memory reference traces provide a wealth of information on the behavior of parallel programs. We have used this information to explore the relationship between kern...
William J. Bolosky, Michael L. Scott, Robert P. Fi...
IEEEARES
2010
IEEE
15 years 4 months ago
Strategies for Reducing Risks of Inconsistencies in Access Control Policies
—Managing access control policies is a complex task. We argue that much of the complexity is unnecessary and mostly due to historical reasons. There are number of legacy policy s...
Bernard Stepien, Stan Matwin, Amy P. Felty
GLOBECOM
2008
IEEE
15 years 4 months ago
Delay Analysis of Wireless Nakagami Fading Channels
—In this paper we analyze the delay performance of a single user with perfect channel state information transmitting data over a wireless fading channel. We consider a dynamic re...
Jared Burdin, Randall Landry