Sciweavers

1363 search results - page 116 / 273
» Distributed Authorization with Distributed Grammars
Sort
View
139
Voted
BXML
2004
15 years 4 months ago
Subject Identification in Topic Maps in Theory and Practice
: If Topic Maps should be exchanged in distributed environments a common semantic problem occurs: Do two Topics refer to the same Subject? If they describe the same Subject the giv...
Lutz Maicher
124
Voted
NETWORK
2007
93views more  NETWORK 2007»
15 years 2 months ago
Modeling VoIP Call Holding Times for Telecommunications
Voice over IP is one of the most popular applications in broadband access networks. It is anticipated that the characteristics of call holding times (CHTs) for VoIP calls will be ...
Whai-En Chen, Hui-Nien Hung, Yi-Bing Lin
CSE
2009
IEEE
15 years 10 months ago
A Hybrid Enforcement Model for Group-centric Secure Information Sharing
—Group-Centric Secure Information Sharing (g-SIS) is motivated by the need to dynamically share information amongst a set of authorized users for a specific purpose. Authorized ...
Ram Krishnan, Ravi S. Sandhu
122
Voted
EDO
2005
Springer
15 years 9 months ago
Experiences in coverage testing of a Java middleware
This paper addresses the issues of test coverage analysis of J2EE servers. These middleware are nowadays at the core of the modern information technology’s landscape. They provi...
Mehdi Kessis, Yves Ledru, Gérard Vandome
CCS
2008
ACM
15 years 5 months ago
Stale-safe security properties for group-based secure information sharing
Attribute staleness arises due to the physical distribution of authorization information, decision and enforcement points. This is a fundamental problem in virtually any secure di...
Ram Krishnan, Jianwei Niu, Ravi S. Sandhu, William...