Sciweavers

327 search results - page 3 / 66
» Access and Use Control using Externally Controlled Reference...
Sort
View
ENTCS
2008
94views more  ENTCS 2008»
13 years 7 months ago
Monitoring External Resources in Java MIDP
We present a Java library for mobile phones which tracks and controls at runtime the use of potentially costly resources, such as premium rate text messages. This improves on the ...
David Aspinall, Patrick Maier, Ian Stark
MIDDLEWARE
2007
Springer
14 years 1 months ago
A service-oriented virtual community overlay network for secure external service orchestration
The Service Oriented Architecture (SOA) is used extensively in ubiquitous computing environments. Using external service orchestration, services can be composed into applications....
Shudong Chen, Johan J. Lukkien
NCA
2007
IEEE
14 years 2 months ago
FRAC: Implementing Role-Based Access Control for Network File Systems
We present FRAC, a Framework for Role-based Access Control in network file systems. FRAC is a reference monitor that controls the message flow between file system clients and s...
Aniruddha Bohra, Stephen Smaldone, Liviu Iftode
HICSS
2007
IEEE
112views Biometrics» more  HICSS 2007»
14 years 2 months ago
The Next Generation of Monitoring and Control Systems Using Synchronized Sampling Technology and Multifunctional IEDs
This paper discusses implementation of the next generation solution for power system control and monitoring. The new design is based on the use of synchronized sampling technology...
Mladen Kezunovic
JCS
2010
122views more  JCS 2010»
13 years 6 months ago
Provably correct inline monitoring for multithreaded Java-like programs
Inline reference monitoring is a powerful technique to enforce security policies on untrusted programs. The security-by-contract paradigm proposed by the EU FP6 S3 MS project uses...
Mads Dam, Bart Jacobs 0002, Andreas Lundblad, Fran...