Sciweavers

704 search results - page 45 / 141
» Building Distributed Access Control System Using Service-Ori...
Sort
View
110
Voted
ICAC
2006
IEEE
15 years 6 months ago
Enabling Self-Managing Applications using Model-based Online Control Strategies
— The increasing heterogeneity, dynamism, and uncertainty of emerging DCE (Distributed Computing Environment) systems imply that an application must be able to detect and adapt t...
Viraj Bhat, Manish Parashar, Hua Liu, Mohit Khande...
166
Voted
IHI
2012
217views Healthcare» more  IHI 2012»
13 years 8 months ago
Declarative privacy policy: finite models and attribute-based encryption
Regulations and policies regarding Electronic Health Information (EHI) are increasingly complex. Federal and State policy makers have called for both education to increase stakeho...
Peifung E. Lam, John C. Mitchell, Andre Scedrov, S...
POPL
2000
ACM
15 years 4 months ago
Type Systems for Distributed Data Structures
Distributed-memory programs are often written using a global address space: any process can name any memory location on any processor. Some languages completely hide the distincti...
Ben Liblit, Alexander Aiken
DBSEC
2006
115views Database» more  DBSEC 2006»
15 years 1 months ago
Creating Objects in the Flexible Authorization Framework
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not ...
Nicola Zannone, Sushil Jajodia, Duminda Wijesekera
105
Voted
SIGGRAPH
1997
ACM
15 years 4 months ago
Interactive simulation of fire in virtual building environments
This paper describes the integration of the Berkeley Architectural Walkthrough Program with the National Institute of Standards and Technology’s CFAST fire simulator. The integ...
Richard W. Bukowski, Carlo H. Séquin