Sciweavers

837 search results - page 91 / 168
» Rewriting-Based Access Control Policies
Sort
View
CORR
2010
Springer
57views Education» more  CORR 2010»
15 years 22 days ago
A Repeated Game Formulation of Energy-Efficient Decentralized Power Control
Decentralized multiple access channels where each transmitter wants to selfishly maximize his transmission energyefficiency are considered. Transmitters are assumed to choose freel...
Mael Le Treust, Samson Lasaulce
WIOPT
2011
IEEE
14 years 4 months ago
Network utility maximization over partially observable Markovian channels
Abstract—This paper considers maximizing throughput utility in a multi-user network with partially observable Markov ON/OFF channels. Instantaneous channel states are never known...
Chih-Ping Li, Michael J. Neely
109
Voted
DIMVA
2009
15 years 1 months ago
A Service Dependency Modeling Framework for Policy-Based Response Enforcement
The use of dynamic access control policies for threat response adapts local response decisions to high level system constraints. However, security policies are often carefully tigh...
Nizar Kheir, Hervé Debar, Fréd&eacut...
ICASSP
2011
IEEE
14 years 4 months ago
Adaptive scalable layer filtering process for video scheduling over wireless networks based on MAC buffer management
In this paper, the problem of scalable video delivery over a timevarying wireless channel is considered. Packet scheduling and buffer management in both Application and Medium Acc...
Nesrine Changuel, Nicholas Mastronarde, Mihaela va...
SP
2002
IEEE
200views Security Privacy» more  SP 2002»
15 years 9 days ago
Design of a Role-Based Trust-Management Framework
We introduce the RT framework, a family of Rolebased Trust-management languages for representing policies and credentials in distributed authorization. RT combines the strengths o...
Ninghui Li, John C. Mitchell, William H. Winsborou...