Sciweavers

352 search results - page 46 / 71
» Context-sensitive Access Control Model and Implementation
Sort
View
JSAC
2007
130views more  JSAC 2007»
15 years 1 months ago
Cross-layer QoS Analysis of Opportunistic OFDM-TDMA and OFDMA Networks
Abstract— Performance analysis of multiuser orthogonal frequency division multiplexing (OFDM-TDMA) and orthogonal frequency division multiple access (OFDMA) networks in support o...
Yu-Jung Chang, Feng-Tsun Chien, C. C. Jay Kuo
WSC
2000
15 years 3 months ago
Simulation as educational support for production and logistics in industrial engineering
The proposed implementation is a monitor system able to train operators for on-line real time manufacturing control in order to analyze the performance of a production process. Th...
Agostino G. Bruzzone, Pietro Giribone, Roberto Rev...
OSDI
2006
ACM
16 years 2 months ago
XFI: Software Guards for System Address Spaces
XFI is a comprehensive protection system that offers both flexible access control and fundamental integrity guarantees, at any privilege level and even for legacy code in commodit...
Úlfar Erlingsson, George C. Necula, Mart&ia...
IEEEARES
2007
IEEE
15 years 8 months ago
CSP-Based Firewall Rule Set Diagnosis using Security Policies
The most important part of a firewall configuration process is the implementation of a security policy by a security administrator. However, this security policy is not designed b...
Sergio Pozo, Rafael Ceballos, Rafael M. Gasca
COOPIS
1998
IEEE
15 years 6 months ago
Context Mediation on Wall Street
This paper reports on a practical implementation of a context mediator for the fixed income securities industry. We describe industry circumstances and the data and calculation se...
Allen Moulton, Stuart E. Madnick, Michael Siegel