Sciweavers

3712 search results - page 469 / 743
» Role-Based Access Control
Sort
View
SSS
2007
Springer
15 years 11 months ago
Self-stabilization and Virtual Node Layer Emulations
We present formal definitions of stabilization for the Timed I/O Automata (TIOA) framework, and of emulation for the timed Virtual Stationary Automata programming abstraction laye...
Tina Nolte, Nancy A. Lynch
ACSAC
2006
IEEE
15 years 11 months ago
Protecting Privacy in Key-Value Search Systems
This paper investigates the general problem of performing key-value search at untrusted servers without loss of user privacy. Specifically, given key-value pairs from multiple ow...
Yinglian Xie, Michael K. Reiter, David R. O'Hallar...
COMPSAC
2006
IEEE
15 years 11 months ago
Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing
In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and ...
Zhengping Wu, Alfred C. Weaver
120
Voted
GLOBECOM
2006
IEEE
15 years 11 months ago
A New MAC Protocol for Wireless Packet Networks
— Medium access control (MAC) protocols for wireless packet networks usually need to be distributed for flexibility and robustness. In a distributed way, however, collision dete...
Jun Peng, Liang Cheng, Biplab Sikdar
167
Voted
ICAC
2006
IEEE
15 years 11 months ago
Towards Autonomic Grid Data Management with Virtualized Distributed File Systems
Grid data management is a challenging task because of the heterogeneous, dynamic and largescale nature of Grid environments. This paper proposes an autonomic Grid data management ...
Ming Zhao 0002, Jing Xu, Renato J. O. Figueiredo