Sciweavers

635 search results - page 65 / 127
» A Context-Sensitive Access Control Model and Prototype Imple...
Sort
View
CCS
2007
ACM
14 years 1 months ago
Protecting users from "themselves"
Computer usage and threat models have changed drastically since the advent of access control systems in the 1960s. Instead of multiple users sharing a single file system, each us...
William Enck, Sandra Rueda, Joshua Schiffman, Yoge...
COMCOM
2007
145views more  COMCOM 2007»
13 years 7 months ago
Jointly rate and power control in contention based MultiHop Wireless Networks
This paper presents a new algorithm for jointly optimal control of session rate, link attempt rate, and link power in contention based MultiHop Wireless Networks. Formulating the ...
Abdorasoul Ghasemi, Karim Faez
ISQED
2009
IEEE
117views Hardware» more  ISQED 2009»
14 years 2 months ago
Adaptive voltage controlled nanoelectronic addressing for yield, accuracy and resolution
An outstanding challenge for realizing nanoelectronic systems is nano-interface design, i.e., how to precisely access a nanoscale wire in an array for communication between a nano...
Bao Liu
STORAGESS
2006
ACM
14 years 1 months ago
Scalable security for large, high performance storage systems
New designs for petabyte-scale storage systems are now capable of transferring hundreds of gigabytes of data per second, but lack strong security. We propose a scalable and effici...
Andrew W. Leung, Ethan L. Miller
ACSD
2003
IEEE
125views Hardware» more  ACSD 2003»
14 years 1 months ago
Modelling a Secure, Mobile, and Transactional System with CO-OPN
Modelling complex concurrent systems is often difficult and error-prone, in particular when new concepts coming from advanced practical applications are considered. These new appl...
Didier Buchs, Stanislav Chachkov, David Hurzeler