Sciweavers

327 search results - page 49 / 66
» Access and Use Control using Externally Controlled Reference...
Sort
View
TISSEC
2010
142views more  TISSEC 2010»
13 years 4 months ago
A logical specification and analysis for SELinux MLS policy
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...
SENSYS
2003
ACM
14 years 3 months ago
Bandwidth management in wireless sensor networks
Wireless sensor networks are often used in monitoring and control applications, where software running on generalpurpose computers “pull” information from remote sensors and ...
Bret Hull, Kyle Jamieson, Hari Balakrishnan
CVRMED
1997
Springer
14 years 2 months ago
An integrated remote neurosurgical system
The Neurovisualization Lab at the University of Virginia is developing the Integrated Remote Neurosurgical System (IRNS) to allow mentoring of neurosurgical procedures in remote l...
B. Sean Graves, Joe Tullio, Minyan Shi, J. Hunter ...
CORR
2010
Springer
74views Education» more  CORR 2010»
13 years 10 months ago
RAFDA: Middleware Supporting the Separation of Application Logic from Distribution Policy
Middleware technologies, often limit the way in which object classes may be used in distributed applications due to the fixed distribution policies imposed by the Middleware system...
Alan Dearle, Scott M. Walker, Stuart J. Norcross, ...
SP
2006
IEEE
148views Security Privacy» more  SP 2006»
14 years 4 months ago
SubVirt: Implementing malware with virtual machines
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-leve...
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad V...