منابع مشابه
Flexible locking in SCOOP
The SCOOP model provides programmers with a simple extension of Eiffel that allows them to produce high-quality concurrent applications with little more effort than sequential ones. The model is simple yet powerful. Nevertheless, its access control policy is pessimistic: (1) all separate actual arguments of a feature call are locked, even if it is not necessary, and (2) at most one client objec...
متن کاملAccess and Mobility Policy Control at the Network Edge
The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...
متن کاملAccess Control Policy Management
Wang, Qihua. Ph.D., Purdue University, May 2009. Access Control Policy Management. Major Professor: Ninghui Li. Access control is the traditional center of gravity of computer security [1]. People specify access control policies to control accesses to resources in computer systems. The management of access control policies include policy specification and policy analysis. In this dissertation, ...
متن کاملFlexible Access Control for Dynamic Collaborative Environments
Credits The work in this thesis has been carried out under the auspices of the Institute for Programming Research and Algorithmics (IPA) research school, within the context of the Centre for Telematics and Information Technology (CTIT). The author was funded by SenterNovem and TNO, through the IOP Gencom project Privacy in an Ambient World (PAW). The cover shows the façade of one of the buildin...
متن کاملFlexible admission control for DiffServ access networks
In our earlier work, we have presented a simple measurement-based admission control (MBAC) scheme for modified Bandwidth Broker framework. In that scheme, real time (RT) traffic is basically able to starve non-admission controlled non-real time (NRT) traffic. By concentrating on real time application requirements it may be hard or even impossible to use other objectives in admission decisions; ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Formal Aspects of Computing
سال: 2008
ISSN: 0934-5043,1433-299X
DOI: 10.1007/s00165-008-0072-9