Sciweavers

20 search results - page 2 / 4
» View-Based Access Control with High Assurance
Sort
View
ICSE
2007
IEEE-ACM
15 years 9 months ago
Testing and Analysis of Access Control Policies
Policy testing and analysis are important techniques for high assurance of correct specification of access control policies. We propose a set of testing and analysis techniques fo...
Evan Martin
TMC
2008
132views more  TMC 2008»
14 years 9 months ago
A Cross-Layer Approach for Per-Station Fairness in TCP over WLANs
In this paper, we investigate the issue of per-station fairness in TCP over IEEE 802.11-compliant wireless local area networks (WLANs), especially in Wi-Fi hot spots. It is asserte...
Eun-Chan Park, Dong-Young Kim, Hwangnam Kim, Chong...
NETWORK
2007
145views more  NETWORK 2007»
14 years 9 months ago
Analysis of Shared Memory Priority Queues with Two Discard Levels
— Two rate SLAs become increasingly popular in today’s Internet, allowing a customer to save money by paying one price for committed traffic and a much lower price for additio...
Shlomi Bergida, Yuval Shavitt
USS
2004
14 years 11 months ago
Design of the EROS Trusted Window System
Window systems are the primary mediator of user input and output in modern computing systems. They are also a commonly used interprocess communication mechanism. As a result, they...
Jonathan S. Shapiro, John Vanderburgh, Eric Northu...
HASE
2008
IEEE
15 years 4 months ago
Low Cost Secure Computation for the General Client-Server Computation Model
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
Liangliang Xiao, I-Ling Yen, Farokh B. Bastani