Sciweavers

147 search results - page 17 / 30
» Towards a Component based Privacy Protector Architecture
Sort
View
SACMAT
2009
ACM
15 years 4 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
VLDB
2002
ACM
125views Database» more  VLDB 2002»
14 years 9 months ago
Self-tuning Database Technology and Information Services: from Wishful Thinking to Viable Engineering
Automatic tuning has been an elusive goal for database technology for a long time and is becoming a pressing issue for modern E-services. This paper reviews and assesses the advan...
Gerhard Weikum, Axel Mönkeberg, Christof Hass...
PERCOM
2008
ACM
14 years 9 months ago
An Infrastructure for Developing Pervasive Learning Environments
This paper presents an infrastructure for developing problem-based pervasive learning environments. Building such environments necessitates having many autonomous components deali...
Sabine Graf, Kathryn MacCallum, Tzu-Chien Liu, Mai...
80
Voted
AICT
2006
IEEE
128views Communications» more  AICT 2006»
15 years 3 months ago
Providing Secure Services in Peer-to-Peer Communications Networks with Central Security Servers
IP Telephony based on Peer-to-Peer (P2P) technology has being gaining attentions for its innovative approach to providing VoIP service. At the same time, it has raised many new re...
Feng Cao, David A. Bryan, Bruce Lowekamp
LCN
2003
IEEE
15 years 2 months ago
Development of QoS Signaling Protocols in the Internet
— QoS signaling protocol is one of the key components in Internet QoS architectures to establish, maintain, and remove reservation states in network nodes. This paper gives an ov...
Xiaoming Fu