Sciweavers

979 search results - page 121 / 196
» Developing Dynamic Security Policies
Sort
View
DATE
2005
IEEE
134views Hardware» more  DATE 2005»
15 years 9 months ago
Assertion-Based Design Exploration of DVS in Network Processor Architectures
With the scaling of technology and higher requirements on performance and functionality, power dissipation is becoming one of the major design considerations in the development of...
Jia Yu, Wei Wu, Xi Chen, Harry Hsieh, Jun Yang 000...
COLCOM
2009
IEEE
15 years 8 months ago
Towards automatic privacy management in Web 2.0 with semantic analysis on annotations
— Sharing personal information and documents is pervasive in Web 2.0 environments, which creates the need for properly controlling shared data. Most existing authorization and po...
Nitya Vyas, Anna Cinzia Squicciarini, Chih-Cheng C...
TCOM
2008
110views more  TCOM 2008»
15 years 3 months ago
Cross-layer Adaptive Transmission: Optimal Strategies in Fading Channels
We consider cross-layer adaptive transmission for a single-user system with stochastic data traffic and a timevarying wireless channel. The objective is to vary the transmit power ...
Anh Tuan Hoang, Mehul Motani
MMMACNS
2005
Springer
15 years 9 months ago
A Modal Logic for Role-Based Access Control
Making correct access-control decisions is central to security, which in turn requires accounting correctly for the identity, credentials, roles, authority, and privileges of users...
Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Ch...
170
Voted
TES
2001
Springer
15 years 8 months ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...