Sciweavers

635 search results - page 42 / 127
» A Context-Sensitive Access Control Model and Prototype Imple...
Sort
View
DSN
2006
IEEE
14 years 1 months ago
Static Analysis to Enforce Safe Value Flow in Embedded Control Systems
Embedded control systems consist of multiple components with different criticality levels interacting with each other. For example, in a passenger jet, the navigation system inter...
Sumant Kowshik, Grigore Rosu, Lui Sha
MMMACNS
2001
Springer
14 years 1 days ago
The Set and Function Approach to Modeling Authorization in Distributed Systems
Abstract. We present a new model that provides clear and precise semantics for authorization. The semantics is independent from underling security mechanisms and is separate from i...
Tatyana Ryutov, B. Clifford Neuman
ICN
2009
Springer
14 years 2 months ago
jSon: Network of Active Elements with Peer-to-Peer Control Plane
In this paper, we describe and evaluate a scalable network of Active Elements (AE) that implements userempowered virtual-multicast overlay network for synchronous data distributio...
Michal Procházka, Petr Holub, Eva Hladk&aac...
CCS
2000
ACM
13 years 12 months ago
XML document security based on provisional authorization
The extensible markup language (XML) is a promising standard for describing semi-structured information and contents on the Internet. When XML comes to be a widespread data encodi...
Michiharu Kudo, Satoshi Hada
RSP
2008
IEEE
120views Control Systems» more  RSP 2008»
14 years 2 months ago
Co-design Architecture and Implementation for Point-Based Rendering on FPGAs
Current graphic cards include advanced graphic processing units to accelerate the rendering of 3D objects with millions of polygons. As object models grow in complexity, the rende...
Mateusz Majer, Stefan Wildermann, Josef Angermeier...