Sciweavers

389 search results - page 21 / 78
» Metamodeling Autonomic System Management Policies - Ongoing ...
Sort
View
79
Voted
CCS
2004
ACM
15 years 3 months ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...
ECOOPW
1999
Springer
15 years 1 months ago
Providing Policy-Neutral and Transparent Access Control in Extensible Systems
Extensible systems, such as Java or the SPIN extensible operating system, allow for units of code, or extensions, to be added to a running system in almost arbitrary fashion. Exte...
Robert Grimm, Brian N. Bershad
DBSEC
2007
106views Database» more  DBSEC 2007»
14 years 11 months ago
Enforcing Honesty in Assured Information Sharing Within a Distributed System
The growing number of distributed information systems such as the internet has created a need for security in data sharing. When several autonomous parties attempt to share data, t...
Ryan Layfield, Murat Kantarcioglu, Bhavani M. Thur...
JNW
2007
102views more  JNW 2007»
14 years 9 months ago
Supporting Privacy Policies in a Publish-Subscribe Substrate for Pervasive Environments
Abstract— A location tracking sensor network is being deployed in several buildings at the University of Michigan to help explore issues in design of pervasive environments. Mana...
Lukasz Opyrchal, Atul Prakash, Amit Agrawal
75
Voted
VTC
2008
IEEE
15 years 4 months ago
Optimizing Adaptive Transmission Policies for Wireless Vehicular Communications
—The adoption of wireless vehicular communication technologies would strongly depend on the technologies transmission reliability, required by QoS demanding traffic safety applic...
Miguel Sepulcre, Javier Gozálvez