Sciweavers

2009 search results - page 270 / 402
» A privacy-aware access control system
Sort
View
POLICY
2004
Springer
14 years 3 months ago
A Decentralized Treatment of a Highly Distributed Chinese-Wall Policy
Access control (AC) technology has come a long way from its roots as the means for sharing resources between processes running on a single machine, to a mechanism for regulating t...
Naftaly H. Minsky
PROFES
2004
Springer
14 years 3 months ago
Development of a Normative Package for Safety-Critical Software Using Formal Regulatory Requirements
Abstract. The important tasks in requirement engineering are resolving requirements inconsistencies between regulators and developers of safety-critical computer systems, and the v...
Sergiy A. Vilkomir, Aditya K. Ghose
ISCAS
1999
IEEE
177views Hardware» more  ISCAS 1999»
14 years 2 months ago
Obtaining digital gradient signals for analog adaptive filters
Analog adaptive filters with digitally programmable coefficients can provide speed, power, and area advantages over digital adaptive filters while overcoming the dc offset problem...
Anthony Chan Carusone, David A. Johns
POPL
2000
ACM
14 years 1 months ago
Verifying Secrets and Relative Secrecy
Systems that authenticate a user based on a shared secret (such as a password or PIN) normally allow anyone to query whether the secret is a given value. For example, an ATM machi...
Dennis M. Volpano, Geoffrey Smith
BIRTHDAY
2008
Springer
14 years 7 days ago
Secure Data Flow in a Calculus for Context Awareness
Abstract. We present a Mobile-Ambients-based process calculus to describe context-aware computing in an infrastructure-based Ubiquitous Computing setting. In our calculus, computin...
Doina Bucur, Mogens Nielsen