Sciweavers

926 search results - page 104 / 186
» Policy framings for access control
Sort
View
95
Voted
AINA
2007
IEEE
15 years 2 months ago
Conflict Detection and Resolution in Context-Aware Authorization
Pervasive computing environments introduce new requirements in expressiveness and flexibility of access control policies which are almost addressable leveraging contextual informa...
Amir Reza Masoumzadeh, Morteza Amini, Rasool Jalil...
ECOOPW
1998
Springer
15 years 2 months ago
Role-Based Protection and Delegation for Mobile Object Environments
PrincipalDomain is an administrative scoping construct for establishing security policies based on the principals invoking object services that may entail objects moving around a ...
Nataraj Nagaratnam, Doug Lea
ISCA
2008
IEEE
137views Hardware» more  ISCA 2008»
15 years 5 months ago
Self-Optimizing Memory Controllers: A Reinforcement Learning Approach
Efficiently utilizing off-chip DRAM bandwidth is a critical issue in designing cost-effective, high-performance chip multiprocessors (CMPs). Conventional memory controllers deli...
Engin Ipek, Onur Mutlu, José F. Martí...
JSAC
2007
107views more  JSAC 2007»
14 years 10 months ago
Admission control in data transfers over lightpaths
—The availability of optical network infrastructure and appropriate user control software has recently made it possible for scientists to establish end-to-end circuits across mul...
Wojciech M. Golab, Raouf Boutaba
IFIP
2004
Springer
15 years 4 months ago
An Interactive Trust Management and Negotiation Scheme
Interactive access control allows a server to compute and communicate on the fly the missing credentials to a client and to adapt its responses on the basis of presented and decli...
Hristo Koshutanski, Fabio Massacci