Sciweavers

307 search results - page 6 / 62
» A Network Access Control Mechanism Based on Behavior Profile...
Sort
View
173
Voted
NDSS
2003
IEEE
15 years 9 months ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet
122
Voted
ESORICS
2009
Springer
16 years 4 months ago
A Privacy Preservation Model for Facebook-Style Social Network Systems
Abstract. Recent years have seen unprecedented growth in the popularity of social network systems, with Facebook being an archetypical example. The access control paradigm behind t...
Philip W. L. Fong, Mohd M. Anwar, Zhen Zhao
113
Voted
SEC
2007
15 years 5 months ago
Trust Evaluation for Web Applications based on Behavioral Analysis
This paper deals with a joint use of a trust evaluation approach and access control mechanisms for improving security in Web-usage. Trust evaluation is achieved by means of both be...
Luiz Fernando Rust C. Carmo, Breno G. de Oliveira,...
116
Voted
ICNSC
2007
IEEE
15 years 10 months ago
Optimization and Control of a Pendulum-driven Cart-pole System
— This paper investigates the motion generation for a pendulum-driven cart-pole system. The dynamic model of this system is developed by using the Newton’s Law. A sixstep motio...
Yang Liu, Hongnian Yu, Brian Burrows
137
Voted
WOWMOM
2006
ACM
158views Multimedia» more  WOWMOM 2006»
15 years 9 months ago
Resource Control for the EDCA Mechanism in Multi-Rate IEEE 802.11e Networks
We investigate the problem of efficient resource control for elastic traffic in IEEE 802.11e’s Enhanced Distributed Channel Access (EDCA) mechanism. Our approach considers an ...
Vasilios A. Siris, Costas Courcoubetis