Sciweavers

137 search results - page 20 / 28
» Extending access control models with break-glass
Sort
View
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
15 years 2 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
ACL
2010
14 years 7 months ago
Demonstration of a Prototype for a Conversational Companion for Reminiscing about Images
This paper describes an initial prototype demonstrator of a Companion, designed as a platform for novel approaches to the following: 1) The use of Information Extraction (IE) tech...
Yorick Wilks, Roberta Catizone, Alexiei Dingli, We...
POLICY
2007
Springer
15 years 3 months ago
Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall
We present a discretionary access control framework that can be used to control a principal’s ability to link information from two or more audit records and compromise a user’...
Apu Kapadia, Prasad Naldurg, Roy H. Campbell
INFOCOM
2010
IEEE
14 years 8 months ago
Coupled 802.11 Flows in Urban Channels: Model and Experimental Evaluation
Abstract—Contending flows in multi-hop 802.11 wireless networks compete with two fundamental asymmetries: (i) channel asymmetry, in which one flow has a stronger signal, potent...
Joseph Camp, Ehsan Aryafar, Edward W. Knightly
WINET
2010
180views more  WINET 2010»
14 years 8 months ago
An analytical model for performance evaluation of multimedia applications over EDCA in an IEEE 802.11e WLAN
—We extend the modeling heuristic of [1] to evaluate the performance of an IEEE 802.11e infrastructure network carrying packet telephone calls, streaming video sessions and TCP c...
Sri Harsha, Anurag Kumar, Vinod Sharma