Sciweavers

800 search results - page 46 / 160
» XML access control using static analysis
Sort
View
IEEEARES
2010
IEEE
15 years 10 months ago
Strategies for Reducing Risks of Inconsistencies in Access Control Policies
—Managing access control policies is a complex task. We argue that much of the complexity is unnecessary and mostly due to historical reasons. There are number of legacy policy s...
Bernard Stepien, Stan Matwin, Amy P. Felty
ECRTS
2005
IEEE
15 years 9 months ago
Cache Contents Selection for Statically-Locked Instruction Caches: An Algorithm Comparison
Cache memories have been extensively used to bridge the gap between high speed processors and relatively slower main memories. However, they are sources of predictability problems...
Antonio Martí Campoy, Isabelle Puaut, Angel...
151
Voted
PST
2008
15 years 4 months ago
An Access Control Scheme for Protecting Personal Data
This paper presents a new personal data access control (PDAC) scheme that is inspired by the protection schemes practiced in communities for sharing valuable commodities. The PDAC...
Wilfred Villegas, Bader Ali, Muthucumaru Maheswara...
HICSS
2003
IEEE
156views Biometrics» more  HICSS 2003»
15 years 8 months ago
Quality-of-Service-Oriented Media Access Control for Advanced Mobile Multimedia Satellite Systems
Satellite networks offer a number of desirable characteristics including wide area coverage, unique broadcast capabilities, the ability to communicate with hand-held devices, and ...
Petia Todorova, Alexander Markhasin
POPL
1990
ACM
15 years 7 months ago
Higher-Order Modules and the Phase Distinction
Typed -calculus is an important tool in programming language research because it provides an extensible framework for studying language features both in isolation and in their rel...
Robert Harper, John C. Mitchell, Eugenio Moggi