Recently, Wobbrock et al. (2008) derived a predictive model of pointing accuracy to complement Fitts’ law’s predictive model of pointing speed. However, their model was based ...
In [1], we proposed a model for policy-based intrusion detection, based on information flow control. In the present paper, we show its applicability and effectiveness on a stand...
Abstract—Some real-time kernels (such as a recent realtime version of Linux) permit to execute interrupt handlers in dedicated threads, to control their interference on realtime ...
In this paper we present a new framework for specifying access control policies in smart spaces called Criticality-Aware Access Control (CAAC). The main idea is to automatically r...
Sandeep K. S. Gupta, Tridib Mukherjee, Krishna K. ...
Abstract. Organizations use Role-Based Access Control (RBAC) to protect computer-based resources from unauthorized access. There has been considerable work on formally specifying R...
Dae-Kyoo Kim, Indrakshi Ray, Robert B. France, Na ...