Sciweavers

769 search results - page 114 / 154
» Policy Storage for Role-Based Access Control Systems
Sort
View
FC
2010
Springer
181views Cryptology» more  FC 2010»
15 years 2 months ago
Design and Implementation of a Key-Lifecycle Management System
Key management is the Achilles’ heel of cryptography. This work presents a novel Key-Lifecycle Management System (KLMS), which addresses two issues that have not been addressed ...
Mathias Björkqvist, Christian Cachin, Robert ...
APLAS
2009
ACM
15 years 5 months ago
Ownership Downgrading for Ownership Types
Ownership types support information hiding by providing object-based encapsulation. However the static restrictions they impose on object accessibility can limit the expressiveness...
Yi Lu 0003, John Potter, Jingling Xue
106
Voted
WIOPT
2011
IEEE
14 years 2 months ago
Network utility maximization over partially observable Markovian channels
Abstract—This paper considers maximizing throughput utility in a multi-user network with partially observable Markov ON/OFF channels. Instantaneous channel states are never known...
Chih-Ping Li, Michael J. Neely
RTSS
1992
IEEE
15 years 2 months ago
Scheduling Sporadic Tasks with Shared Resources in Hard-Real-Time Systems
The problem of scheduling a set of sporadic tasks that share a set of serially reusable, single unit software resources on a single processor is considered. The correctness condit...
Kevin Jeffay
ICC
2007
IEEE
15 years 5 months ago
Satisfying Elastic Short Term Fairness in High Throughput Wireless Communication Systems with Multimedia Services
Abstract—In this paper we study the problem of providing shortterm access time fairness in wireless communication systems with multimedia services, while still maintaining high s...
Timotheos Kastrinogiannis, Symeon Papavassiliou