Sciweavers

926 search results - page 121 / 186
» Policy framings for access control
Sort
View
IJISEC
2007
149views more  IJISEC 2007»
14 years 10 months ago
Dynamic security labels and static information flow control
This paper presents a language in which information flow is securely controlled by a type system, yet the security class of data can vary dynamically. Information flow policies ...
Lantian Zheng, Andrew C. Myers
77
Voted
INFOCOM
2008
IEEE
15 years 4 months ago
Measurement and Modeling of the Origins of Starvation in Congestion Controlled Mesh Networks
—Significant progress has been made in understanding the behavior of TCP and congestion-controlled traffic over multihop wireless networks. Despite these advances, however, no ...
Jingpu Shi, Omer Gurewitz, Vincenzo Mancuso, Josep...
ICC
2007
IEEE
229views Communications» more  ICC 2007»
15 years 2 months ago
A Cross-Layer Design on the Basis of Multiple Packet Reception in Asynchronous Wireless Network
This paper concerns the cross-layer design between physical layer and MAC (Multiple Access Control) layer in asynchronous wireless random access network. The proposed cross-layer d...
Anxin Li, Mingshu Wang, Xiangming Li, Hidetoshi Ka...
93
Voted
ITCC
2005
IEEE
15 years 4 months ago
Event-Based Blackboard Architecture for Multi-Agent Systems
Developing large multi-agent systems is a complex task involving the processes of the requirement, architecture, design and implementation of these systems. In particular, the arc...
Jing Dong, Shanguo Chen, Jun-Jang Jeng
ICDM
2007
IEEE
135views Data Mining» more  ICDM 2007»
15 years 4 months ago
Private Inference Control for Aggregate Database Queries
Data security is a critical issue for many organizations. Sensitive data must be protected from both inside and outside attackers. Access control policies and related mechanisms h...
Geetha Jagannathan, Rebecca N. Wright