Sciweavers

798 search results - page 117 / 160
» Comparing the expressive power of access control models
Sort
View
DIM
2005
ACM
15 years 3 months ago
A delegation framework for federated identity management
Identity federation is a powerful scheme that links accounts of users maintained distinctly by different business partners. The concept of network identity is a driver for accele...
Hidehito Gomi, Makoto Hatakeyama, Shigeru Hosono, ...
ICDE
2007
IEEE
164views Database» more  ICDE 2007»
15 years 8 months ago
Multi-session Separation of Duties (MSoD) for RBAC
Separation of duties (SoD) is a key security requirement for many business and information systems. Role Based Access Controls (RBAC) is a relatively new paradigm for protecting i...
David W. Chadwick, Wensheng Xu, Sassa Otenko, Roma...
ICC
2009
IEEE
118views Communications» more  ICC 2009»
14 years 11 months ago
Downlink Resource Allocation for OFDMA-Based Multiservice Networks with Imperfect CSI
Abstract--This paper addresses practical implementation issues of resource allocation in OFDMA networks: inaccuracy of channel state information (CSI) available to the resource all...
Mohamad Khattar Awad, Veluppillai Mahinthan, Mehri...
114
Voted
LREC
2008
117views Education» more  LREC 2008»
15 years 3 months ago
Chooser: a Multi-Task Annotation Tool
The paper presents a tool assisting manual annotation of linguistic data developed at the Department of Computational linguistics, IBL-BAS. Chooser is a general-purpose modular ap...
Svetla Koeva, Borislav Rizov, Svetlozara Leseva
HIPEAC
2007
Springer
15 years 5 months ago
Sunflower :  Full-System, Embedded Microarchitecture Evaluation
Abstract. This paper describes Sunflower, a full-system microarchitectural evaluation environment for embedded computing systems. The environment enables detailed microarchitectura...
Phillip Stanley-Marbell, Diana Marculescu