Sciweavers

1057 search results - page 147 / 212
» Type-Based Distributed Access Control
Sort
View
AINA
2007
IEEE
15 years 7 months ago
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy
In hierarchical distributed systems, shared data access can be controlled by assigning user groups single cryptographic keys that allow high level users derive low level keys, but...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl
115
Voted
BIRTHDAY
2008
Springer
15 years 2 months ago
Secure Data Flow in a Calculus for Context Awareness
Abstract. We present a Mobile-Ambients-based process calculus to describe context-aware computing in an infrastructure-based Ubiquitous Computing setting. In our calculus, computin...
Doina Bucur, Mogens Nielsen
106
Voted
DMDW
2000
118views Management» more  DMDW 2000»
15 years 1 months ago
View security as the basis for data warehouse security
Access. permissions in a data warehouse are currently managed in a separate world from the sources' policies. The consequences are inconsistencies, slow response to change, a...
Arnon Rosenthal, Edward Sciore
LANOMS
2007
IEEE
149views Education» more  LANOMS 2007»
15 years 6 months ago
Management Issues on Wireless Mesh Networks
—Wireless Mesh Networks (WMN) are emerging as a flexible and low-cost alternative to provide digital inclusion through multi-hop communications, supporting applications from las...
Jairo L. Duarte, Diego G. Passos, Rafael L. Valle,...
CONCUR
2007
Springer
15 years 6 months ago
A Marriage of Rely/Guarantee and Separation Logic
Abstract. In the quest for tractable methods for reasoning about concurrent algorithms both rely/guarantee logic and separation logic have made great advances. They both seek to ta...
Viktor Vafeiadis, Matthew J. Parkinson