Sciweavers

209 search results - page 20 / 42
» Exploiting Information Relationships for Access Control
Sort
View
CCS
2004
ACM
15 years 2 months ago
MAC and UML for secure software design
Security must be a first class citizen in the design of large scale, interacting, software applications, at early and all stages of the lifecycle, for accurate and precise policy ...
Thuong Doan, Steven A. Demurjian, T. C. Ting, Andr...
SIGMETRICS
2005
ACM
100views Hardware» more  SIGMETRICS 2005»
15 years 3 months ago
On AS-level path inference
The ability to discover the AS-level path between two end-points is valuable for network diagnosis, performance optimization, and reliability enhancement. Virtually all existing t...
Zhuoqing Morley Mao, Lili Qiu, Jia Wang, Yin Zhang
ICC
2007
IEEE
15 years 3 months ago
Satisfying Elastic Short Term Fairness in High Throughput Wireless Communication Systems with Multimedia Services
Abstract—In this paper we study the problem of providing shortterm access time fairness in wireless communication systems with multimedia services, while still maintaining high s...
Timotheos Kastrinogiannis, Symeon Papavassiliou
EUROSSC
2006
Springer
15 years 1 months ago
Context-Aware Trust Domains
Context-aware service platforms need to establish and manage trust relationships for users to know if the user's privacy policies are being enforced and for service providers ...
Ricardo Neisse, Maarten Wegdam, Marten van Sindere...
IWSOS
2007
Springer
15 years 3 months ago
Automated Trust Negotiation in Autonomic Environments
Autonomic computing environments rely on devices that are able to make intelligent decisions without human supervision. Automated Trust Negotiation supports the cooperation of devi...
Andreas Klenk, Frank Petri, Benoit Radier, Mika&eu...