Sciweavers

926 search results - page 85 / 186
» Policy framings for access control
Sort
View
WPES
2003
ACM
15 years 4 months ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett
ISCA
2008
IEEE
114views Hardware» more  ISCA 2008»
15 years 5 months ago
Globally-Synchronized Frames for Guaranteed Quality-of-Service in On-Chip Networks
Future chip multiprocessors (CMPs) may have hundreds to thousands of threads competing to access shared resources, and will require quality-of-service (QoS) support to improve sys...
Jae W. Lee, Man Cheuk Ng, Krste Asanovic
IEEEARES
2008
IEEE
15 years 5 months ago
Static Validation of Licence Conformance Policies
Policy conformance is a security property gaining importance due to commercial interest like Digital Rights Management. It is well known that static analysis can be used to valida...
René Rydhof Hansen, Flemming Nielson, Hanne...
ESOP
2010
Springer
15 years 8 months ago
Enforcing Stateful Authorization and Information Flow Policies in Fine
Proving software free of security bugs is hard. Languages that ensure that programs correctly enforce their security policies would help, but, to date, no security-typed language h...
Nikhil Swamy, Juan Chen and Ravi Chugh
WIOPT
2006
IEEE
15 years 5 months ago
Resource control for the EDCA and HCCA mechanisms in IEEE 802.11e networks
— We investigate the problem of efficient resource control for elastic traffic over the EDCA (Enhanced Distributed Channel Access) and HCCA (Hybrid Coordination Function HCF - ...
Vasilios A. Siris, Costas Courcoubetis