publié le: May 2011
We present a new technique that can trace data provenance and enforce data access policies across multiple applications and machines. We have develop...
Recent studies have shown that network coding can provide significant benefits to network protocols, such as increased throughput, reduced network co...
Nexus Authorization Logic (NAL) provides a principled basis for specifying and reasoning about credentials and authorization policies. It extends pri...
publié le: December 1975
Methods of achieving look-ahead in processing units are discussed. An optimality criterion is proposed, and several schemes are compared against the...
Access control to IT systems increasingly relies on the ability to compose policies. Hence there is benefit in any framework for policy composition t...