Sciweavers

2335 search results - page 72 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
140
Voted
ICDCS
2008
IEEE
15 years 11 months ago
Controlled Information Sharing in Collaborative Distributed Query Processing
We present a simple, yet powerful, approach for the specification and enforcement of authorizations regulating data release among data holders collaborating in a distributed comp...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
150
Voted
TCS
2008
15 years 4 months ago
Role-based access control for boxed ambients
Our society is increasingly moving towards richer forms of information exchange where mobility of processes and devices plays a prominent role. This tendency has prompted the acad...
Adriana B. Compagnoni, Elsa L. Gunter, Philippe Bi...
ICNS
2006
IEEE
15 years 10 months ago
Building Distributed Access Control System Using Service-Oriented Programming Model
– Service-Oriented Programming Model is a new methodology for building service-oriented applications. In the Service-Oriented Programming Model, an application is assembled from ...
Ivan Zuzak, Sinisa Srbljic, Ivan Benc
IPPS
2009
IEEE
15 years 11 months ago
Throughput-fairness tradeoff in Best Effort flow control for on-chip architectures
We consider two flow control schemes for Best Effort traffic in on-chip architectures, which can be deemed as the solutions to the boundary extremes of a class of utility maximi...
Fahimeh Jafari, Mohammad Sadegh Talebi, Mohammad H...
TELSYS
2010
140views more  TELSYS 2010»
14 years 11 months ago
Information system security compliance to FISMA standard: a quantitative measure
To ensure that safeguards are implemented to protect against a majority of known threats, industry leaders are requiring information processing systems to comply with security stan...
Elaine Hulitt, Rayford B. Vaughn