منابع مشابه
Data Is Key: Introducing the Data-Based Access Control Paradigm
According to the Jericho forum, the trend in information security is moving the security perimeter as close to the data as possible. In this context, we suggest the idea of data-based access control, where decryption of data is made possible by knowing enough of the data. Trust is thus based on what someone already knows. A specific problem is defined as follows: given n pieces of data, an agen...
متن کاملIntroducing Access Control in Webdamlog
We survey recent work on the specification of an access control mechanism in a collaborative environment. The work is presented in the context of the WebdamLog language, an extension of datalog to a distributed context. We discuss a fine-grained access control mechanism for intentional data based on provenance as well as a control mechanism for delegation, i.e., for deploying rules at remote pe...
متن کاملIntroducing Semantic Conflict Resolution to Word Based Software Transactional Memory
In this paper we describe the implementation of a contention manager which deals with semantic conflicts within word based Software Transactional Memory. Semantic conflicts are introduced which prevent transactions from committing their execution due to the presence of some application condition and can be resolved by the reordering of transaction execution. We consider application semantics to...
متن کاملEmbedded Memory Hierarchy Exploration Based on Magnetic Random Access Memory
Static random access memory (SRAM) is the most commonly employed semiconductor in the design of on-chip processor memory. However, it is unlikely that the SRAM technology will have a cell size that will continue to scale below 45 nm, due to the leakage current that is caused by the quantum tunneling effect. Magnetic random access memory (MRAM) is a candidate technology to replace SRAM, assuming...
متن کاملIntroducing Real-time Interactions
This report introduces a new rigorous notation called Real-time Interactions that can be used to model the interactions between a system and its environment. The concept of RealTime Interactions (RTIs) is introduced, and the Conversation Constraint Language (CCL), an abstract notation that is used to record the interactions that occur in a system and between the system and its environment in a ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2016
ISSN: 2169-3536
DOI: 10.1109/access.2016.2524447