Sciweavers

486 search results - page 54 / 98
» policy 2005
Sort
View
MMMACNS
2005
Springer
15 years 3 months ago
A Modal Logic for Role-Based Access Control
Making correct access-control decisions is central to security, which in turn requires accounting correctly for the identity, credentials, roles, authority, and privileges of users...
Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Ch...
ACSC
2005
IEEE
15 years 3 months ago
Auction Based Resource Negotiation in NOMAD
The challenges faced by mobile and distributed applications include the ability to discover and negotiate for the resources required for execution. The NOMAD (Negotiated Object Mo...
Kris Bubendorfer, John H. Hine
90
Voted
ACSD
2005
IEEE
169views Hardware» more  ACSD 2005»
15 years 3 months ago
Automating Synthesis of Asynchronous Communication Mechanisms
Asynchronous data communication mechanisms (ACMs) have been extensively studied as data connectors between independently timed processes in digital systems. In previous work, syst...
Jordi Cortadella, Kyller Costa Gorgônio, Fei...
SISW
2005
IEEE
15 years 3 months ago
Towards Protecting Sensitive Files in a Compromised System
Protecting sensitive files from a compromised system helps administrator to thwart many attacks, discover intrusion trails, and fast restore the system to a safe state. However, ...
Xin Zhao, Kevin Borders, Atul Prakash
SOSP
2005
ACM
15 years 6 months ago
IRON file systems
Commodity file systems trust disks to either work or fail completely, yet modern disks exhibit more complex failure modes. We suggest a new fail-partial failure model for disks, ...
Vijayan Prabhakaran, Lakshmi N. Bairavasundaram, N...