Sciweavers

2655 search results - page 70 / 531
» Event Systems and Access Control
Sort
View
WETICE
1997
IEEE
15 years 8 months ago
How Role Based Access Control is Implemented in SESAME
In this paper we want to share our experiences with implementing a scheme that enforces role based access control in a distributed, heterogeneous computing environment. This work ...
Mark Vandenwauver, René Govaerts, Joos Vand...
ICDE
2005
IEEE
109views Database» more  ICDE 2005»
15 years 10 months ago
TCP Congestion Window Controlling Algorithms on iSCSI Sequential Read Access
iSCSI is one of the most promising technologies in IPSAN, which decreases a storage management cost. Congestion Window, one of TCP parameters, has a close relationship with system...
Machiko Toyoda, Masato Oguchi, Saneyasu Yamaguchi
FASE
2010
Springer
15 years 2 months ago
A Verifiable Modeling Approach to Configurable Role-Based Access Control
Role-based access control (RBAC) is a popular access control model for enterprise systems due to its economic benefit and scalability. There are many RBAC features available, each ...
Dae-Kyoo Kim, Lunjin Lu, Sangsig Kim
GLOBECOM
2009
IEEE
15 years 8 months ago
Evolutionary Games for Hybrid Additive White Gaussian Noise Multiple Access Control
Abstract-- In this paper, we propose an evolutionary gametheoretic framework for hybrid additive white Gaussian noise multiple access channels. We consider a communication system c...
Quanyan Zhu, Hamidou Tembine, Tamer Basar
IJSEKE
2011
165views more  IJSEKE 2011»
14 years 8 months ago
Model Checking for Verification of Mandatory Access Control Models and Properties
rather wide gap in abstraction between policies and mechanisms. In this paper, we propose a general approach for property verification for MAC models. The approach defines a stan...
Vincent C. Hu, D. Richard Kuhn, Tao Xie, JeeHyun H...