Sciweavers

804 search results - page 19 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
PKC
2009
Springer
210views Cryptology» more  PKC 2009»
15 years 10 months ago
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
In this work, we consider the task of allowing a content provider to enforce complex access control policies on oblivious protocols conducted with anonymous users. As our primary ...
Scott E. Coull, Matthew Green, Susan Hohenberger
76
Voted
ISCC
2000
IEEE
15 years 1 months ago
Light Weight Security for Parallel Access to Multiple Mirror Sites
Mirror sites approach has been proposed recently for reducing the access delay and providing load balancing in network servers. In the mirror site approach a file, such as a multi...
Bülent Yener
KES
2008
Springer
14 years 9 months ago
A Secure Mediator for Integrating Multiple Level Access Control Policies
Abstract. We present a method for mapping security levels among the components of a distributed system where data in the local sources are represented in XML. Distributed data is i...
Isabel F. Cruz, Rigel Gjomemo, Mirko Orsini
SIGMETRICS
2008
ACM
150views Hardware» more  SIGMETRICS 2008»
14 years 9 months ago
Performance of random medium access control, an asymptotic approach
Random Medium-Access-Control (MAC) algorithms have played an increasingly important role in the development of wired and wireless Local Area Networks (LANs) and yet the performanc...
Charles Bordenave, David McDonald, Alexandre Prout...
CORR
2011
Springer
146views Education» more  CORR 2011»
14 years 1 months ago
Use of Devolved Controllers in Data Center Networks
—In a data center network, for example, it is quite often to use controllers to manage resources in a centralized manner. Centralized control, however, imposes a scalability prob...
Adrian Sai-Wah Tam, Kang Xi, H. Jonathan Chao