Sciweavers

327 search results - page 41 / 66
» Access and Use Control using Externally Controlled Reference...
Sort
View
123
Voted
CSFW
2004
IEEE
15 years 6 months ago
Cassandra: Flexible Trust Management, Applied to Electronic Health Records
We study the specification of access control policy in large-scale distributed systems. We present Cassandra, a language and system for expressing policy, and the results of a sub...
Moritz Y. Becker, Peter Sewell
119
Voted
CAISE
2010
Springer
15 years 3 months ago
Dynamic Authorisation Policies for Event-Based Task Delegation
Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are tw...
Khaled Gaaloul, Ehtesham Zahoor, François C...
109
Voted
WSC
2000
15 years 4 months ago
Simulation as educational support for production and logistics in industrial engineering
The proposed implementation is a monitor system able to train operators for on-line real time manufacturing control in order to analyze the performance of a production process. Th...
Agostino G. Bruzzone, Pietro Giribone, Roberto Rev...
112
Voted
DAIS
2009
15 years 3 months ago
Dependency Management in Smart Homes
In future smart homes functionality will be provided to the inhabitants by software services decoupled from the underlying hardware devices. While this will enhance flexibility and...
Daniel Retkowitz, Sven Kulle
132
Voted
MICRO
2003
IEEE
106views Hardware» more  MICRO 2003»
15 years 8 months ago
Near-Optimal Precharging in High-Performance Nanoscale CMOS Caches
High-performance caches statically pull up the bitlines in all cache subarrays to optimize cache access latency. Unfortunately, such an architecture results in a significant wast...
Se-Hyun Yang, Babak Falsafi