Sciweavers

307 search results - page 6 / 62
» A Network Access Control Mechanism Based on Behavior Profile...
Sort
View
NDSS
2003
IEEE
14 years 26 days ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet
ESORICS
2009
Springer
14 years 8 months ago
A Privacy Preservation Model for Facebook-Style Social Network Systems
Abstract. Recent years have seen unprecedented growth in the popularity of social network systems, with Facebook being an archetypical example. The access control paradigm behind t...
Philip W. L. Fong, Mohd M. Anwar, Zhen Zhao
SEC
2007
13 years 9 months ago
Trust Evaluation for Web Applications based on Behavioral Analysis
This paper deals with a joint use of a trust evaluation approach and access control mechanisms for improving security in Web-usage. Trust evaluation is achieved by means of both be...
Luiz Fernando Rust C. Carmo, Breno G. de Oliveira,...
ICNSC
2007
IEEE
14 years 1 months ago
Optimization and Control of a Pendulum-driven Cart-pole System
— This paper investigates the motion generation for a pendulum-driven cart-pole system. The dynamic model of this system is developed by using the Newton’s Law. A sixstep motio...
Yang Liu, Hongnian Yu, Brian Burrows
WOWMOM
2006
ACM
158views Multimedia» more  WOWMOM 2006»
14 years 1 months ago
Resource Control for the EDCA Mechanism in Multi-Rate IEEE 802.11e Networks
We investigate the problem of efficient resource control for elastic traffic in IEEE 802.11e’s Enhanced Distributed Channel Access (EDCA) mechanism. Our approach considers an ...
Vasilios A. Siris, Costas Courcoubetis