Sciweavers

640 search results - page 80 / 128
» Access Control for Active Spaces
Sort
View
HICSS
2003
IEEE
153views Biometrics» more  HICSS 2003»
14 years 2 months ago
Balancing Safety Against Performance: Tradeoffs in Internet Security
All Internet-accessible computing systems are currently faced with incessant threats ranging from simple scriptkiddies to highly sophisticated criminal enterprises. In response to...
Vu A. Ha, David J. Musliner
CCS
2011
ACM
12 years 8 months ago
Automatic error finding in access-control policies
Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to prote...
Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripun...
SSS
2007
Springer
130views Control Systems» more  SSS 2007»
14 years 3 months ago
Decentralized Detector Generation in Cooperative Intrusion Detection Systems
We consider Cooperative Intrusion Detection System (CIDS) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay netwo...
Rainer Bye, Katja Luther, Seyit Ahmet Çamte...
CODES
2008
IEEE
13 years 10 months ago
Application specific non-volatile primary memory for embedded systems
Memory subsystems have been considered as one of the most critical components in embedded systems and furthermore, displaying increasing complexity as application requirements div...
Kwangyoon Lee, Alex Orailoglu
GLOBECOM
2007
IEEE
14 years 3 months ago
Advanced Multicast and Broadcast Content Distribution in Mobile Cellular Networks
—Recently 3GPP (Third Generation Partnership Project) has standardised MBMS (Multimedia Broadcast Multicast Services) enabling broadcast and multicast transmissions over GPRS (Ge...
Michael Knappmeyer, Björn Ricks, Ralf Tö...