Sciweavers

499 search results - page 57 / 100
» An Integrated Model for Access Control and Information Flow ...
Sort
View
IEEEARES
2008
IEEE
14 years 2 months ago
Context Ontology for Secure Interoperability
During interoperability exchanges, organizations are jointly conducting computation and sharing tasks. However, organizations can have different security policies. To guarantee g...
Céline Coma, Nora Cuppens-Boulahia, Fr&eacu...
DSD
2004
IEEE
97views Hardware» more  DSD 2004»
13 years 11 months ago
Scene Management Models and Overlap Tests for Tile-Based Rendering
Tile-based rendering (also called chunk rendering or bucket rendering) is a promising technique for low-power, 3D graphics platforms. This technique decomposes a scene into smalle...
Iosif Antochi, Ben H. H. Juurlink, Stamatis Vassil...
EDBTW
2004
Springer
13 years 11 months ago
Semantic Web Recommender Systems
Research on recommender systems has primarily addressed centralized scenarios and largely ignored open, decentralized systems where remote information distribution prevails. Absenc...
Cai-Nicolas Ziegler
INFOCOM
2007
IEEE
14 years 1 months ago
Service Charge and Energy-Aware Vertical Handoff in Integrated IEEE 802.16e/802.11 Networks
Abstract— This paper considers two issues arising in an integrated IEEE 802.16e/802.11 network: 1) finding a possible network, which mobile station (MSTA) can switch to, and 2) ...
Youngkyu Choi, Sunghyun Choi
FASE
2008
Springer
13 years 9 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu