Sciweavers

807 search results - page 49 / 162
» Term Rewriting for Access Control
Sort
View
CCS
2005
ACM
15 years 10 months ago
PeerAccess: a logic for distributed authorization
This paper introduces the PeerAccess framework for reasoning about authorization in open distributed systems, and shows how a parameterization of the framework can be used to reas...
Marianne Winslett, Charles C. Zhang, Piero A. Bona...
108
Voted
NSDI
2008
15 years 7 months ago
Ad-hoc Guesting: When Exceptions Are the Rule
People's work days are filled with exceptions to normal routine. These exceptions affect the security and privacy of their information access and sharing. In a recent ethnogr...
Brinda Dalal, Les Nelson, Diana K. Smetters, Natha...
CSREAEEE
2006
110views Business» more  CSREAEEE 2006»
15 years 6 months ago
Network-in Quality the E-Business
Recent advances in user access technology enables the delivery of Network multicast to residential users. In order for such a service to be successful, efficient management must b...
Kaiquan Chen
CLOUD
2010
ACM
15 years 10 months ago
G-Store: a scalable data store for transactional multi key access in the cloud
Cloud computing has emerged as a preferred platform for deploying scalable web-applications. With the growing scale of these applications and the data associated with them, scalab...
Sudipto Das, Divyakant Agrawal, Amr El Abbadi
JSAC
2010
138views more  JSAC 2010»
15 years 3 months ago
Dynamic conjectures in random access networks using bio-inspired learning
—Inspired by the biological entities’ ability to achieve reciprocity in the course of evolution, this paper considers a conjecture-based distributed learning approach that enab...
Yi Su, Mihaela van der Schaar