Sciweavers

351 search results - page 30 / 71
» Formalisation and implementation of Access control models
Sort
View
78
Voted
SSS
2009
Springer
118views Control Systems» more  SSS 2009»
15 years 5 months ago
Brief Announcement: A Simple and Quiescent Omega Algorithm in the Crash-Recovery Model
We present a simple algorithm that implements the Omega failure detector in the crash-recovery model. The algorithm is quiescent, i.e., eventually all the processes but the leader ...
Cristian Martín, Mikel Larrea
SECON
2007
IEEE
15 years 6 months ago
Fairness and Physical Layer Capture in Random Access Networks
Abstract— While physical layer capture has been observed in real implementations of wireless devices which randomly accessing shared channels, fair rate control algorithms based ...
Hoon Chang, Vishal Misra, Dan Rubenstein
IADIS
2003
15 years 1 months ago
Integrating RBAC Mechanisms in a Web Server
Hypermedia systems (whether web sites or not) should support multilevel policiesm, offering different views and manipulation abilities of the same information to users with differ...
Daniel Sanz-García, Paloma Díaz, Ign...
114
Voted
EMSOFT
2006
Springer
15 years 4 months ago
Modeling a system controller for timing analysis
Upper bounds on worst-case execution times, which are commonly called WCET, are a prerequisite for validating the temporal correctness of tasks in a real-time system. Due to the e...
Stephan Thesing
CCS
2008
ACM
15 years 2 months ago
Enforcing a security pattern in stakeholder goal models
Patterns are useful knowledge about recurring problems and solutions. Detecting a security problem using patterns in requirements models may lead to its early solution. In order t...
Yijun Yu, Haruhiko Kaiya, Hironori Washizaki, Ying...