Sciweavers

360 search results - page 61 / 72
» Distributed policy processing in active-service based infras...
Sort
View
SP
2000
IEEE
105views Security Privacy» more  SP 2000»
15 years 4 months ago
Open Source in Security: Visiting the Bizarre
Although open-source software development has virtues, there is reason to believe that the approach would not have a significant effect on the security of today’s systems. The ...
Fred B. Schneider
96
Voted
NOMS
2008
IEEE
118views Communications» more  NOMS 2008»
15 years 6 months ago
Policy-based self-management of hybrid ad hoc networks for dynamic channel configuration
— Wireless networks have become a ubiquitous reality and ever more surround our everyday activities. They form and disappear around us spontaneously and have become new means for...
Antonis M. Hadjiantonis, George Pavlou
110
Voted
VLDB
2004
ACM
118views Database» more  VLDB 2004»
15 years 5 months ago
On the performance of bitmap indices for high cardinality attributes
It is well established that bitmap indices are efficient for read-only attributes with low attribute cardinalities. For an attribute with a high cardinality, the size of the bitma...
Kesheng Wu, Ekow J. Otoo, Arie Shoshani
INFOCOM
2010
IEEE
14 years 10 months ago
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
—Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this para...
Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou
TCS
2008
14 years 11 months ago
Role-based access control for boxed ambients
Our society is increasingly moving towards richer forms of information exchange where mobility of processes and devices plays a prominent role. This tendency has prompted the acad...
Adriana B. Compagnoni, Elsa L. Gunter, Philippe Bi...