Sciweavers

868 search results - page 139 / 174
» Resiliency policies in access control
Sort
View
ICS
2011
Tsinghua U.
14 years 5 months ago
Page placement in hybrid memory systems
Phase-Change Memory (PCM) technology has received substantial attention recently. Because PCM is byte-addressable and exhibits access times in the nanosecond range, it can be used...
Luiz E. Ramos, Eugene Gorbatov, Ricardo Bianchini
ICEB
2004
152views Business» more  ICEB 2004»
15 years 3 months ago
A Multi-Agent System for E-Business Processes Monitoring in a Web-Based Environment
In this paper, we present a multi-agent system MAGS for the e-business processes monitoring in a web-based environment. We classify the types of agents in MAGS by their monitoring...
Xinyu Zhao, Cen Wu, Runjie Zhang, Chen Zhao, Zuoqu...
RBAC
1998
84views more  RBAC 1998»
15 years 3 months ago
Decentralized User-role Assignment for Web-based Intranets
The intricacy of security administration is one of the most challenging problems in large networked systems. This problem is especially serious in the Web environment, which consi...
Ravi S. Sandhu, Joon S. Park
IEEESP
2008
136views more  IEEESP 2008»
15 years 2 months ago
The Crutial Way of Critical Infrastructure Protection
Today, critical infrastructures like the power grid are essentially physical processes controlled by computers connected by networks. They are usually as vulnerable as any other i...
Alysson Neves Bessani, Paulo Sousa, Miguel Correia...
ENTCS
2006
123views more  ENTCS 2006»
15 years 1 months ago
Nonmonotonic Trust Management for P2P Applications
Community decisions about access control in virtual communities are non-monotonic in nature. This means that they cannot be expressed in current, monotonic trust management langua...
Marcin Czenko, Ha Tran, Jeroen Doumen, Sandro Etal...