Sciweavers

704 search results - page 31 / 141
» Building Distributed Access Control System Using Service-Ori...
Sort
View
101
Voted
FAC
2010
107views more  FAC 2010»
14 years 11 months ago
Algebra and logic for access control
: © Algebra and logic for access control Matthew Collinson, David Pym HP Laboratories HPL-2008-75R1 Access control, process algebra, bunched Logic; systems modelling The access co...
Matthew Collinson, David J. Pym
107
Voted
VTC
2008
IEEE
173views Communications» more  VTC 2008»
15 years 6 months ago
Adaptive Call Admission Control with Dynamic Resource Reallocation for Cell-Based Multirate Wireless Systems
—This paper studies the admission control and resource allocation in a cell-based wireless system that supports singlemedia and multirate services. Utilizing the idea of adaptive...
Kai-Wei Ke, Chen-Nien Tsai, Ho-Ting Wu, Chia-Hao H...
86
Voted
WSC
2007
15 years 2 months ago
Simulation of time to first water application for the First Interstate Bank fire
On May 4, 1988 a fire occurred after hours on the 12th floor of the First Interstate Bank building, a 62 story steelframe office tower in Los Angeles California. The sprinkler sys...
Robert Till
FASE
2003
Springer
15 years 5 months ago
Spatial Security Policies for Mobile Agents in a Sentient Computing Environment
Abstract. A Sentient Computing environment is one in which the system is able to perceive the state of the physical world and use this information to customise its behaviour. Mobil...
David Scott, Alastair R. Beresford, Alan Mycroft
97
Voted
SP
2007
IEEE
113views Security Privacy» more  SP 2007»
15 years 6 months ago
Usable Mandatory Integrity Protection for Operating Systems
Existing mandatory access control systems for operating systems are difficult to use. We identify several principles for designing usable access control systems and introduce the...
Ninghui Li, Ziqing Mao, Hong Chen