Sciweavers

316 search results - page 45 / 64
» Variations in Access Control Logic
Sort
View
70
Voted
EDCC
2008
Springer
14 years 11 months ago
SONDe, a Self-Organizing Object Deployment Algorithm in Large-Scale Dynamic Systems
We present the design, correctness, and analysis of SONDe, a simple fully decentralized object deployment algorithm for highly requested systems. Given an object (service or data)...
Vincent Gramoli, Anne-Marie Kermarrec, Erwan Le Me...
91
Voted
CCS
2009
ACM
15 years 10 months ago
A conceptual framework for Group-Centric secure information sharing
In this paper, we propose a conceptual framework for developing a family of models for Group-Centric information sharing. The traditional approach to information sharing, characte...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...
DBSEC
2004
170views Database» more  DBSEC 2004»
14 years 11 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...
SACMAT
2003
ACM
15 years 2 months ago
Cooperative role-based administration
In large organizations the administration of access privileges (such as the assignment of an access right to a user in a particular role) is handled cooperatively through distribu...
Horst Wedde, Mario Lischka
ICCAD
2005
IEEE
114views Hardware» more  ICCAD 2005»
15 years 6 months ago
Double-gate SOI devices for low-power and high-performance applications
: Double-Gate (DG) transistors have emerged as promising devices for nano-scale circuits due to their better scalability compared to bulk CMOS. Among the various types of DG device...
Kaushik Roy, Hamid Mahmoodi-Meimand, Saibal Mukhop...