Sciweavers

926 search results - page 133 / 186
» Policy framings for access control
Sort
View
ESORICS
2005
Springer
15 years 3 months ago
On Obligations
Access control is concerned with granting access to sensitive data based on conditions that relate to the past or present, so-called provisions. Expressing requirements from the do...
Manuel Hilty, David A. Basin, Alexander Pretschner
111
Voted
CORR
2008
Springer
119views Education» more  CORR 2008»
14 years 9 months ago
Prototyping and Performance Analysis of a QoS MAC Layer for Industrial Wireless Network
: Today's industrial sensor networks require strong reliability and guarantees on messages delivery. These needs are even more important in real time applications like control...
Adrien van den Bossche, Thierry Val, Eric Campo
88
Voted
JCM
2008
75views more  JCM 2008»
14 years 10 months ago
A Secure Mobile Agents Platform
Abstract--Mobile Agents is a new paradigm for distributed computing where security is very essential to the acceptance of this paradigm in a large scale distributed environment. In...
Leila Ismail
80
Voted
SOSP
2007
ACM
15 years 7 months ago
Information flow control for standard OS abstractions
ion Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek Eddie Kohler† Robert Morris MIT CSAIL †UCLA http://flum...
Maxwell N. Krohn, Alexander Yip, Micah Z. Brodsky,...
DOA
2001
94views more  DOA 2001»
14 years 11 months ago
How to Monitor and Control Resource Usage in Mobile Agent Systems
The Mobile Agent technology has already shown its advantages, but at the same time has already remarked new problems currently limiting its diffusion in commercial environments. A...
Paolo Bellavista, Antonio Corradi, Cesare Stefanel...