Sciweavers

1517 search results - page 220 / 304
» Time and Location Based Services with Access Control
Sort
View
SIGMETRICS
2008
ACM
179views Hardware» more  SIGMETRICS 2008»
14 years 9 months ago
Xengine: a fast and scalable XACML policy evaluation engine
XACML has become the de facto standard for specifying access control policies for various applications, especially web services. With the explosive growth of web applications depl...
Alex X. Liu, Fei Chen, JeeHyun Hwang, Tao Xie
SIGMOD
2005
ACM
123views Database» more  SIGMOD 2005»
15 years 10 months ago
Middleware based Data Replication providing Snapshot Isolation
Many cluster based replication solutions have been proposed providing scalability and fault-tolerance. Many of these solutions perform replica control in a middleware on top of th...
Yi Lin, Bettina Kemme, Marta Patiño-Mart&ia...
ICDCS
2008
IEEE
15 years 4 months ago
Availability and Fairness Support for Storage QoS Guarantee
Multi-dimensional storage virtualization (MDSV) allows multiple virtual disks, each with a distinct combination of capacity, latency and bandwidth requirements, to be multiplexed ...
Gang Peng, Tzi-cker Chiueh
FGCS
2010
99views more  FGCS 2010»
14 years 8 months ago
A conceptual model for attribute aggregation
This paper describes a conceptual model for attribute aggregation that allows a service provider (SP) to authorise a user’s access request based on attributes asserted by multip...
David W. Chadwick, George Inman, Nate Klingenstein
ACNS
2004
Springer
77views Cryptology» more  ACNS 2004»
15 years 3 months ago
A Pay-per-Use DoS Protection Mechanism for the Web
Internet service providers have resisted deploying Denial-of-Service (DoS) protection mechanisms despite numerous research results in the area. This is so primarily because ISPs ca...
Angelos Stavrou, John Ioannidis, Angelos D. Keromy...