Sciweavers

926 search results - page 117 / 186
» Policy framings for access control
Sort
View
VTC
2008
IEEE
152views Communications» more  VTC 2008»
15 years 4 months ago
Network Controlled Joint Radio Resource Management for Heterogeneous Networks
Abstract— In this paper, we propose a way of achieving optimality in radio resource management (RRM) for heterogeneous networks. We consider a micro or femto cell with two co-loc...
Marceau Coupechoux, Jean Marc Kelif, Philippe Godl...
HICSS
2005
IEEE
134views Biometrics» more  HICSS 2005»
15 years 4 months ago
Virtual Organizations as Normative Multiagent Systems
In this paper we propose a conceptual model of virtual organizations as normative multiagent systems. The dynamic aspects of virtual organizations are modeled using aspects of spe...
Guido Boella, Joris Hulstijn, Leendert W. N. van d...
SASO
2007
IEEE
15 years 4 months ago
Shruti: A Self-Tuning Hierarchical Aggregation System
Current aggregation systems either have a single inbuilt aggregation mechanism or require applications to specify an aggregation policy a priori. It is hard to predict the read an...
Praveen Yalagandula, Michael Dahlin
DFN
2003
14 years 12 months ago
Virtual Private Networks Coping with Complexity
: Large-scale deployment of virtual private networks with hundreds or thousands of clients means a constant battle with complexity that can only be won by setting up powerful authe...
Andreas Steffen
ICFP
2008
ACM
15 years 10 months ago
AURA: a programming language for authorization and audit
This paper presents AURA, a programming language for access control that treats ordinary programming constructs (e.g., integers and recursive functions) and authorization logic co...
Limin Jia, Jeffrey A. Vaughan, Karl Mazurak, Jianz...