Sciweavers

3899 search results - page 19 / 780
» Argumentation for Access Control
Sort
View
CCS
2007
ACM
14 years 4 months ago
Detecting relay attacks with timing-based protocols
Distance bounding protocols have been proposed as means of detecting relay attacks, also known as mafia fraud. In this paper we present the first symmetric key based distance bou...
Jason Reid, Juan Manuel González Nieto, Tee...
JTRES
2010
ACM
13 years 10 months ago
Exhaustive testing of safety critical Java
With traditional testing, the test case has no control over non-deterministic scheduling decisions, and thus errors dependent on scheduling are only found by pure chance. Java Pat...
Tomás Kalibera, Pavel Parizek, Michal Maloh...
RAS
2007
109views more  RAS 2007»
13 years 9 months ago
On point-to-point motion planning for underactuated space manipulator systems
In free-floating mode, space manipulator systems have their actuators turned off, and exhibit nonholonomic behavior due to angular momentum conservation. The system is underactua...
Ioannis Tortopidis, Evangelos Papadopoulos
ISVLSI
2005
IEEE
69views VLSI» more  ISVLSI 2005»
14 years 3 months ago
Pipelined Memory Controllers for DSP Applications Handling Unpredictable Data Accesses
Multimedia applications are often characterized by a large number of data accesses with regular and periodic access patterns. In these cases, optimized pipelined memory access con...
Bertrand Le Gal, Emmanuel Casseau, Sylvain Huet, E...
MMMACNS
2005
Springer
14 years 3 months ago
Foundation for a Time Interval Access Control Model
A new model for representing temporal access control policies is introduced. In this model, temporal authorizations are represented by time attributes associated with both subjects...
Francis B. Afinidad, Timothy E. Levin, Cynthia E. ...