Sciweavers

2335 search results - page 51 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
CDC
2008
IEEE
193views Control Systems» more  CDC 2008»
15 years 4 months ago
Admission control and routing in multi-hop wireless networks
To enable services such as streaming multimedia and voice in multi-hop wireless networks it is necessary to develop algorithms that guarantee Quality of Service (QoS). In this pape...
Juan José Jaramillo, R. Srikant
WSC
2001
15 years 6 months ago
Improving simulation model adaptability with a production control framework
Simulation models provide a powerful tool for the analysis of manufacturing systems, but their utility beyond the design stage of the system life cycle is hampered by the high cos...
Sean M. Gahagan, Jeffrey W. Herrmann
132
Voted
SECURWARE
2008
IEEE
15 years 11 months ago
Security Patterns for Capturing Encryption-Based Access Control to Sensor Data
—A security pattern describes a particular recurring security problem that arises in specific contexts, and presents a well-proven generic solution for it [1]. This paper descri...
Ángel Cuevas, Paul El Khoury, Laurent Gomez...
163
Voted
IFIP
2010
Springer
14 years 11 months ago
Cryptographic Enforcement of Role-Based Access Control
Many cryptographic schemes have been designed to enforce information flow policies. However, enterprise security requirements are often better encoded, or can only be encoded, usin...
Jason Crampton
CCS
2006
ACM
15 years 8 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch