Sciweavers

926 search results - page 98 / 186
» Policy framings for access control
Sort
View
POPL
2000
ACM
15 years 3 months ago
A Type System for Expressive Security Policies
Certified code is a general mechanism for enforcing security properties. In this paradigm, untrusted mobile code carries annotations that allow a host to verify its trustworthine...
David Walker
74
Voted
AMW
2010
15 years 12 days ago
Chasing after Secrets in Relational Databases
Abstract. Inference control can guarantee confidentiality but is costly to implement. Access control can be implemented efficiently but cannot guarantee confidentiality. Hence, it ...
Joachim Biskup, Sven Hartmann, Sebastian Link, Jan...
75
Voted
ECTEL
2007
Springer
15 years 5 months ago
Exploiting Policies in an Open Infrastructure for Lifelong Learning
Nowadays, people are in need for continuous learning in order to keep up to date or be upgraded in their job. An infrastructure for lifelong learning requires continuous adaptation...
Juri Luca De Coi, Philipp Kärger, Arne Wolf K...
WOWMOM
2005
ACM
117views Multimedia» more  WOWMOM 2005»
15 years 4 months ago
Temporal Fairness Provisioning in Multi-Rate Contention-Based 802.11e WLANs
The IEEE 802.11e extensions for QoS support in WLAN define the transmission opportunity (TXOP) concept, in order to limit the channel holding times of the contending stations in ...
Ilenia Tinnirello, Sunghyun Choi
76
Voted
CDC
2008
IEEE
139views Control Systems» more  CDC 2008»
15 years 5 months ago
Human-in-the-loop vehicle routing policies for dynamic environments
— In this paper we design coordination policies for a routing problem requiring human-assisted classification of targets through analysis of information gathered on-site by auto...
Ketan Savla, Tom Temple, Emilio Frazzoli