Sciweavers

370 search results - page 44 / 74
» Enforcing Access Control Using Risk Assessment
Sort
View
SIGMOD
2003
ACM
104views Database» more  SIGMOD 2003»
16 years 2 months ago
XML schema
The United States Environmental Protection Agency (EPA) prepares a national criteria and hazardous air pollutant (HAP) emission inventory with input from numerous states, local an...
Charles E. Campbell, Andrew Eisenberg, Jim Melton
126
Voted
IISWC
2006
IEEE
15 years 8 months ago
Modeling Cache Sharing on Chip Multiprocessor Architectures
— As CMPs are emerging as the dominant architecture for a wide range of platforms (from embedded systems and game consoles, to PCs, and to servers) the need to manage on-chip res...
Pavlos Petoumenos, Georgios Keramidas, Håkan...
CONCUR
2007
Springer
15 years 8 months ago
Mobility Control Via Passports
Dπ is a simple distributed extension of the π-calculus in which agents are explicitly located, and may use an explicit migration construct to move between locations. In this pap...
Samuel Hym
ACSAC
2001
IEEE
15 years 5 months ago
The Authorization Service of Tivoli Policy Director
This paper presents the Authorization Service provided by Tivoli Policy Director (PD) and its use by PD family members as well as third-party applications. Policies are defined ov...
Günter Karjoth
201
Voted
VLDB
2006
ACM
138views Database» more  VLDB 2006»
16 years 2 months ago
Succinct representation of flexible and privacy-preserving access rights
Abstract We explore the problem of portable and flexible privacy preserving access rights that permit access to a large collection of digital goods. Privacy-preserving access contr...
Marina Blanton, Mikhail J. Atallah