Filters








421,131 Hits in 5.9 sec

Taxonomy of Data Prefetching for Multicore Processors

Surendra Byna, Yong Chen, Xian-He Sun
<span title="">2009</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/5acgllsvrbf5dar4dbo3vyrz2a" style="color: black;">Journal of Computer Science and Technology</a> </i> &nbsp;
Data prefetching is an effective data access latency hiding technique to mask the CPU stall caused by cache misses and to bridge the performance gap between processor and memory.  ...  Classification of Data Access Patterns Hardware-controlled, software-controlled, and hybrid hardware/software-controlled approaches largely use prediction algorithms based on history of data accesses or  ...  Similar to hardware-controlled history-based prefetching methods, history-based hybrid strategies are not highly beneficial with random access patterns.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s11390-009-9233-4">doi:10.1007/s11390-009-9233-4</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gebfnjl6lveerjqunmitbus2u4">fatcat:gebfnjl6lveerjqunmitbus2u4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160412011133/http://www.cs.iit.edu:80/~scs/psfiles/4192.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/fe/4c/fe4c42f4b559121226d19f819d1707c678e7415d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s11390-009-9233-4"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

A Taxonomy of Data Prefetching Mechanisms

Surendra Byna, Yong Chen, Xian-He Sun
<span title="">2008</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/s2bxkfkzxbafzk4a3m5tlajfuy" style="color: black;">Parallel Architectures, Algorithms and Networks (I-SPAN), Proceedings of the International Symposium on</a> </i> &nbsp;
The International Symposium on Parallel Architectures, Algorithms, and Networks 978-0-7695-3125-0/08 $25.00  ...  Many prefetching techniques have been proposed in the last few years to reduce data access latency by taking advantage of multi-core architectures.  ...  Figure 3 , hardware controlled, software controlled, and hardware/software controlled approaches use prediction algorithms based on history of data accesses or cache misses.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/i-span.2008.24">doi:10.1109/i-span.2008.24</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ispan/BynaCS08.html">dblp:conf/ispan/BynaCS08</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/lxpnnmj75bah7apihghg6babum">fatcat:lxpnnmj75bah7apihghg6babum</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170830034718/https://sdm.lbl.gov/~sbyna/research/papers/2008-ISPAN-Taxonomy.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/49/7c/497cf2a63c2b6e41719f47ec130f5bca897ad6b7.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/i-span.2008.24"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

A Taxonomy of Data Prefetching Mechanisms

Yee Yee Soe
<span title="2019-09-25">2019</span> <i title="Zenodo"> Zenodo </i> &nbsp;
Many prefetching techniques have been proposed in the few years to reduce data access latency by taking advantage of multi core architectures.  ...  Data prefetching has been considered an effective way to cross the performance gap between processor and memory and to mask data access latency caused by cache misses.  ...  Hardware-controlled, software-controlled, and hardware/software controlled proposals use prediction algorithms based on the past of data accesses or cache misses have shown in figure-3.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.3589409">doi:10.5281/zenodo.3589409</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7s22baymabe4tcl7f5jqsirmhy">fatcat:7s22baymabe4tcl7f5jqsirmhy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200211141213/https://zenodo.org/record/3589409/files/189%20A%20Taxonomy%20of%20Data%20Prefetching%20Mechanisms.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/db/7f/db7f358052ffc878351b3918b79c8d10800b53d3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.3589409"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> zenodo.org </button> </a>

Real-time transactions with execution histories

Erdoğan Doğdu, Gültekin Özsoyoğlu
<span title="">1997</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/6g37zvjwwrhv3dizi6ffue642m" style="color: black;">Proceedings of the sixth international conference on Information and knowledge management - CIKM &#39;97</a> </i> &nbsp;
We assume that execution histories of transactions under different load conditions are available, and propose a number of priority assignment techniques based on execution histories and evaluate them through  ...  In this paper, we consider new priority assignment and load control policies for real-time transactions.  ...  load control protocols based on the transaction size estimation from transaction execution histories {histograms).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/266714.266915">doi:10.1145/266714.266915</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/cikm/DogduO97.html">dblp:conf/cikm/DogduO97</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/6y2bnk6jwndsvbvw4lcr6oaozi">fatcat:6y2bnk6jwndsvbvw4lcr6oaozi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190218011800/https://static.aminer.org/pdf/PDF/000/095/229/real_time_transactions_with_execution_histories_priority_assignment_and_load.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6a/b8/6ab85407c9058ee7a9e84a7f72bf7e0d7f9a7a8f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/266714.266915"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Enforcement of U-XACML History-Based Usage Control Policy [chapter]

Fabio Martinelli, Ilaria Matteucci, Paolo Mori, Andrea Saracino
<span title="">2016</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
The Usage Control model is very flexible, and mutable attributes can be exploited also to make a decision based on the actions that have been previously authorized and executed.  ...  This paper presents a history-based variant of U-XACML policies composed via process algebra-like operators in order to take trace of past actions made on resources by the subjects.  ...  Conclusion and Future Work This paper presents a formal approach to combine Usage Control policy to obtain an History based U-XACML policy that is enforceable at run time.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-46598-2_5">doi:10.1007/978-3-319-46598-2_5</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hbj3jdo3anbypgeacmoof4bfji">fatcat:hbj3jdo3anbypgeacmoof4bfji</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190427095237/http://puma.isti.cnr.it/rmydownload.php?filename=cnr.iit/cnr.iit/2016-A2-038/2016-A2-038.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/cd/51/cd51f53b8a7388cbeb8d2eff23b0055a62a73598.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-46598-2_5"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

The Endpoint Application Execution Control Scheme based on the Whitelist

Chang-Hong Kim, Jeong-Hyun Yi, Jong-Bae Kim
<span title="2015-04-30">2015</span> <i title="Science and Engineering Research Support Society"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ipzxul43l5gzra2ybnqv2nfjpe" style="color: black;">International Journal of Control and Automation</a> </i> &nbsp;
integrity, media access control, prevention of modification of important files, and control over IP/port attempting for process access or reverse link.  ...  and attacks through exploitation of an application or operating system vulnerability, by implementing a hybrid of technology such as whitelist-based application execution control via authentication of  ...  Lastly, it performs process behavior based authentication of the application, once executed, and based on execution control policy with regards to prevention of modification of important files and control  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/ijca.2015.8.4.10">doi:10.14257/ijca.2015.8.4.10</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wz6aosa2o5e3pe5hokxsuyx7v4">fatcat:wz6aosa2o5e3pe5hokxsuyx7v4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180603012812/http://www.sersc.org/journals/IJCA/vol8_no4/10.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/75/48/7548dd8cb8daa9841572cca785b1f2ca609c9b4e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/ijca.2015.8.4.10"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Leveraging speculative architectures for run-time program validation

Juan Carlos Martinez Santos, Yunsi Fei
<span title="">2008</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/nmhv25e6jvhplcow6e2chjryx4" style="color: black;">2008 IEEE International Conference on Computer Design</a> </i> &nbsp;
The on-chip branch target buffer (BTB) is utilized as a cache of the legitimate control flow transfers stored in a secure memory region.  ...  At each indirect branch site, the BTB is used to validate the decision history of conditional branches before it, and more information about the future decision path is fetched to monitor the execution  ...  Based on our profiling study, Fig. 3 shows the ratio of the number of conditional branch executions over the number of indirect control instruction executions for several SPECINT benchmarks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/iccd.2008.4751907">doi:10.1109/iccd.2008.4751907</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/iccd/SantosF08.html">dblp:conf/iccd/SantosF08</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qscfzf6inbe4hfn4hxo37pmn3u">fatcat:qscfzf6inbe4hfn4hxo37pmn3u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809095847/http://iccd.et.tudelft.nl/2008/proceedings/498santos.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/02/af/02afc98d3ef13cb641542ccb534578a7b4c7c808.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/iccd.2008.4751907"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Leveraging speculative architectures for runtime program validation

Juan Carlos Martinez Santos, Yunsi Fei
<span title="2013-08-01">2013</span> <i title="Association for Computing Machinery (ACM)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/3yu4mbaainhw5gol4yayc35pfe" style="color: black;">ACM Transactions on Embedded Computing Systems</a> </i> &nbsp;
The on-chip branch target buffer (BTB) is utilized as a cache of the legitimate control flow transfers stored in a secure memory region.  ...  At each indirect branch site, the BTB is used to validate the decision history of conditional branches before it, and more information about the future decision path is fetched to monitor the execution  ...  Based on our profiling study, Fig. 3 shows the ratio of the number of conditional branch executions over the number of indirect control instruction executions for several SPECINT benchmarks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2501626.2512456">doi:10.1145/2501626.2512456</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wqzvuaorvrfczcegvsr3usr7oi">fatcat:wqzvuaorvrfczcegvsr3usr7oi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809095847/http://iccd.et.tudelft.nl/2008/proceedings/498santos.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/02/af/02afc98d3ef13cb641542ccb534578a7b4c7c808.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2501626.2512456"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Flexible security policies for digital libraries

Barbara T. Blaustein, Catherine McCollum, Arnon Rosenthal
<span title="1996-12-01">1996</span> <i title="Association for Computing Machinery (ACM)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/eiea26iqqjcatatlgxdpzt637y" style="color: black;">ACM Computing Surveys</a> </i> &nbsp;
The AMULET approach allows enforcement of flexible policies by making access contingent on execution of specified procedures [Blaustein et al.].  ...  MITRE has developed an approach that adds history to the criteria considered in access and release policies.  ...  Controls can be based on execution context, such as actions taken, checks made, or access as part of particular functions, rather than just user identity.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/242224.242366">doi:10.1145/242224.242366</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4yn46nilsnd2xdpvkyxzqwweiq">fatcat:4yn46nilsnd2xdpvkyxzqwweiq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/19980630145732/http://www.mitre.org:80/pubs/data_mgt/Papers/a110-blaustein.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d1/fe/d1fe23b2cdb9244e1bd40e1f43909b50b46ef71d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/242224.242366"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Itinerary-Based Access Control for Mobile Tasks in Scientific Workflows

Zijiang Yang, Shiyong Lu, Ping Yang
<span title="">2007</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/6fvrx6ji2nauffetsxyi4abwam" style="color: black;">21st International Conference on Advanced Information Networking and Applications Workshops (AINAW&#39;07)</a> </i> &nbsp;
In this paper, we propose an itinerary-based access control model to ensure the secure migration of mobile tasks.  ...  Since a mobile task might migrate across various administrative domains and get executed at multiple hosts, it is critically important to ensure the security of a mobiletask-based workflow system.  ...  To support secure migration and execution of mobile tasks, we proposed an itinerary based access control model for host visit that not only considers the host visit history of a mobile task but also its  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/ainaw.2007.215">doi:10.1109/ainaw.2007.215</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/aina/YangLY07.html">dblp:conf/aina/YangLY07</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/af27rwn2kfc5hovzx6vfbfj76u">fatcat:af27rwn2kfc5hovzx6vfbfj76u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20080422191702/http://www.cs.wayne.edu/~shiyong/papers/ubisafe07_01.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/36/8d/368da423f92fea3117e67fb79ae0ecebf82b0c19.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/ainaw.2007.215"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

A permission system for secure AOP

Wouter De Borger, Bart De Win, Bert Lagaisse, Wouter Joosen
<span title="">2010</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/scibxvvu3nguvnnafnqcwt7lcy" style="color: black;">Proceedings of the Eighth International Conference on Aspect-Oriented Software Development - AOSD &#39;10</a> </i> &nbsp;
We have defined and prototyped a run-time policy enforcement model based on execution history to protect programs from untrusted aspects.  ...  The newly composed aspect typically has many, if not unrestricted, rights to read and modify attributes of the base system.  ...  History-based Access Control The second part of our approach is the execution historybased access control model (HBAC) [2] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1739230.1739254">doi:10.1145/1739230.1739254</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/aosd/BorgerWLJ10.html">dblp:conf/aosd/BorgerWLJ10</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/m5dionupubefbmr5ee3fcbn25e">fatcat:m5dionupubefbmr5ee3fcbn25e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170812213630/https://lirias.kuleuven.be/bitstream/123456789/266052/1/paper.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/3c/68/3c68c20fbefce8a690e6717aac7fed6454e22753.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1739230.1739254"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Leaking Secrets through Modern Branch Predictor in the Speculative World [article]

Md Hafizul Islam Chowdhuryy, Fan Yao
<span title="2021-07-21">2021</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
We further investigate PHT collision mechanism in the history-based predictor as well as the branch prediction mode transitions in Intel processors.  ...  We present an extensive BranchSpectre code gadget analysis on a set of popular real-world application code bases followed by a demonstration of real-world side channel attack on OpenSSL.  ...  Note that while executing the same branch will guarantee the same PHT entry is accessed in one-level predictor, different PHT entries may be exercised for the same branch in history-based mode based on  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2107.09833v1">arXiv:2107.09833v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3fovrjwoxnglla6g53cwcutqcu">fatcat:3fovrjwoxnglla6g53cwcutqcu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210723014459/https://arxiv.org/pdf/2107.09833v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c2/3b/c23b2e097ce99ea842048f6835c01da70b0bf65b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2107.09833v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Testing of PolPA-based usage control systems

Antonia Bertolino, Said Daoudagh, Francesca Lonetti, Eda Marchetti, Fabio Martinelli, Paolo Mori
<span title="2013-08-22">2013</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ebi7q3ex3rg5jft2nycpainznm" style="color: black;">Software quality journal</a> </i> &nbsp;
Accordingly, we propose two testing strategies specifically conceived for validating the history-based access control and the usage control functionalities of the PolPA PDP.  ...  In this paper, we address the testing of the implementation of the Policy Decision Point (PDP) within the PolPA authorization system that enables history-based and usage-based control of accesses.  ...  Acknowledgment This work has been partially funded by the Network of Excellence on Engineering Secure Future Internet Software Services and Systems (NESSoS) FP7 Project contract n. 256980.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s11219-013-9216-0">doi:10.1007/s11219-013-9216-0</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/u25xppqjsrhttpuu37ke2zihq4">fatcat:u25xppqjsrhttpuu37ke2zihq4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190428204937/http://puma.isti.cnr.it/rmydownload.php?filename=cnr.iit/cnr.iit/2013-A0-021/2013-A0-021.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/fe/67/fe6717d15e088ffe2065e86bcdc83f5792375c50.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s11219-013-9216-0"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

A Discussion of Communication Schemes for Process Execution Histories to Enforce Entailment Constraints in Process-Driven SOAs

Thomas Quirchmayr, Mark Strembeck
<span title="2014-08-12">2014</span> <i title="Oxford University Press (OUP)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/bf4qaipmsrghrjyxonrsmqevie" style="color: black;">Computer journal</a> </i> &nbsp;
In this paper, we discuss communication schemes for (distributed) process execution histories in a SOA.  ...  Since the enforcement of entailment constraints requires knowledge of the subjects and roles who executed particular task instances, we need to communicate the execution history of the respective tasks  ...  In recent years, role-based access control (RBAC) has developed into a de facto standard for access control in software-based systems.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1093/comjnl/bxu071">doi:10.1093/comjnl/bxu071</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/pgr4vlk5sbdjnaw34jhuqjhnga">fatcat:pgr4vlk5sbdjnaw34jhuqjhnga</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170901014255/https://oup.silverchair-cdn.com/oup/backfile/Content_public/Journal/comjnl/58/10/10.1093/comjnl/bxu071/3/bxu071.pdf?Expires=1504257734&amp;Signature=f-xRF0uGC2k1C5B8ZHHs5Xd6hiVtDpdvfT7~5V8V5rSnoG331-1m~WuxVkA-6cM8KBJfoUGrcOGOBsxBw~Dk1xYxyA3N1PPWHru28E7uyDKB7supnMFoSrleg4MV3A9Tst2OdFStD-vN1f5z99BZ2MFxifimnQD~soO-D0bso1MkRxWyJ~zaqW4wAy4vyFAG3TF9dIB777NS50Su1CKKKAXRFuKmVPu3f6JrAf9PT3DsSEuTB-qISvq93LHqXcy4GCzC3zJYc6PKeqZghzeHrzQPayKPKaT2UMlPbzloZHy8DzqaLzk1tjtjhJVXR3aQY20cxaqXn8mjXsGBoJx0XA__&amp;Key-Pair-Id=APKAIUCZBIA4LVPAVW3Q" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b1/52/b1520eb412dc05663b45c5a599a75ff1c217e297.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1093/comjnl/bxu071"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> oup.com </button> </a>

A framework for decentralized access control

Meenakshi Balasubramanian, Abhishek Bhatnagar, Namit Chaturvedi, Atish Datta Chowdhury, Arul Ganesh
<span title="">2007</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 2nd ACM symposium on Information, computer and communications security - ASIACCS &#39;07</a> </i> &nbsp;
We present a framework for decentralized authorization for physical access control, using smart cards, where access to individual rooms is guarded by context-dependent policies that are dynamically evaluated  ...  Upon an access request, user automata are executed at the point of access in the presence of current context information. This results in an allow/deny decision.  ...  Upon access request a controller and the smart card come together to execute the policies stored in the user's card, and decide whether to grant or deny access based on the context information.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1229285.1229302">doi:10.1145/1229285.1229302</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/BalasubramanianBCCG07.html">dblp:conf/ccs/BalasubramanianBCCG07</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ecsy6riimfetdgqleicstwp4a4">fatcat:ecsy6riimfetdgqleicstwp4a4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190217054449/https://static.aminer.org/pdf/20170130/pdfs/ccs/onpugw7yhdteyt5f6enmijlqbqz4xbxv.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a5/d6/a5d6c11da42fc7d660ce6981a57986c6285a0843.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1229285.1229302"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 421,131 results