نتایج جستجو برای: separation mechanism

تعداد نتایج: 681790  

2002
Roy H. Campbell Jalal Al-Muhtadi Prasad Naldurg Geetanjali Sampemane M. Dennis Mickunas

Pervasive computing environments with their interconnected devices and services promise seamless integration of digital infrastructure into our everyday lives. While the focus of current research is on how to connect new devices and build useful applications to improve functionality, the security and privacy issues in such environments have not been explored in any depth. While traditional dist...

Journal: :Journal of Systems and Software 2004
Changgui Chen Weijia Jia Wanlei Zhou

Most fault-tolerant application programs cannot cope with constant changes in their environments and user requirements because they embed policies and mechanisms together so that if the policies or mechanisms are changed the whole programs have to be changed as well. This paper presents a reactive system approach to overcoming this limitation. The reactive system concepts are an attractive para...

2007
Michael A. Smith Andrew Schain Kendall Clark Arlen Griffey Vladimir Kolovski

Among the challenges of managing NASA’s information systems is the management (that is, creation, coordination, verification, validation, and enforcement) of many different role-based access control policies and mechanisms. This paper describes an actual data federation use case that demonstrates the inefficiencies created by this challenge and presents an approach to reducing these inefficienc...

2014
Gagan Goel Afshin Nikzad Adish Singla

Designing optimal pricing policies and mechanisms for allocating tasks to workers is central to online crowdsourcing markets. In this paper, we consider the following realistic setting of online crowdsourcing markets – we are given a set of heterogeneous tasks requiring certain skills; each worker has certain expertise and interests which define the set of tasks she is interested in and willing...

Journal: :Electr. Notes Theor. Comput. Sci. 2006
Thomas B. Quillinan Simon N. Foley

Traditional trust management authorisation decisions for distributed technologies, are, in general, based on the history of the authorisations/computation to date. We consider this a pull authorisation strategy: the authorisation decision reflects the current and/or past authorisations. In this paper, we examine this pull strategy and propose an alternative form of authorisation in a distribute...

2000
Zhaoyu Liu Roy H. Campbell Sudha K. Varadarjan Prasad Naldurg Seung Yi M. Dennis Mickunas

In this paper we describe an alternative, exible approach to multicast security in active networks. Traditional schemes for securing multicast communication have key management and scalability problems for many typical applications. In addition, traditional mechanisms are not capable of expressing exible, situational security policies for multicast sessions and participants. Our scheme exploits...

Journal: :MIS Quarterly 2012
Daning Hu J. Leon Zhao Zhimin Hua Michael C. S. Wong

In the wake of the 2008 financial tsunami, existing methods and tools for managing financial risks have been criticized for weaknesses in monitoring and alleviating risks at the systemic level. A 2009 article in Nature suggested new approaches to modeling economic meltdowns are needed to prevent future financial crises. However, existing studies have not focused on analysis of systemic risk at ...

2014
Iacovos Kirlappos Simon Parkin M. Angela Sasse

Over the past decade, security researchers and practitioners have tried to understand why employees do not comply with organizational security policies and mechanisms. Past research has treated compliance as a binary decision: people comply, or they do not. From our analysis of 118 in-depth interviews with individuals (employees in a large multinational organization) about security non-complian...

2011
Peter Williams

Urban growth management in New South Wales (NSW) has had a patchy history. Deficiencies have existed at the State level for example, in the policies and mechanisms for the management of the impact of development on natural resource values and environmental quality. Included in this scenario are various market-based instruments, the utilisation of which have been part of the Australian policy an...

1995
Paul R. Wilson Mark S. Johnstone Michael Neely David Boles

Dynamic memory allocation has been a fundamental part of most computer systems since roughly 1960, and memory allocation is widely considered to be either a solved problem or an insoluble one. In this survey, we describe a variety of memory allocator designs and point out issues relevant to their design and evaluation. We then chronologically survey most of the literature on allocators between ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید