Sciweavers

164 search results - page 23 / 33
» Audit-based compliance control
Sort
View
IROS
2006
IEEE
96views Robotics» more  IROS 2006»
14 years 1 months ago
Turning Maneuvers of a Multi-legged Modular Robot Using Its Inherent Dynamic Characteristics
— This paper deals with the motion of a multi-legged modular robot. The robot consists of six homogenous modules, each of which has a body and two legs and is connected to the ot...
Shinya Aoi, Hitoshi Sasaki, Kazuo Tsuchiya
SP
2006
IEEE
110views Security Privacy» more  SP 2006»
14 years 1 months ago
Privacy and Contextual Integrity: Framework and Applications
Contextual integrity is a conceptual framework for understanding privacy expectations and their implications developed in the literature on law, public policy, and political philo...
Adam Barth, Anupam Datta, John C. Mitchell, Helen ...
SOUPS
2005
ACM
14 years 1 months ago
Usable security and privacy: a case study of developing privacy management tools
Privacy is a concept which received relatively little attention during the rapid growth and spread of information technology through the 1980’s and 1990’s. Design to make info...
Carolyn Brodie, Clare-Marie Karat, John Karat, Jin...
PDCAT
2004
Springer
14 years 25 days ago
A High-Level Policy Description Language for the Network ACL
Malicious codes and worms comprise the largest portion of the loss caused the security problem in the Internet. Small worms such as the “Blaster” spread quickly through the eno...
Jangha Kim, Kanghee Lee, Sangwook Kim, Jungtaek Se...
DISCEX
2003
IEEE
14 years 23 days ago
The STRONGMAN Architecture
The design principle of restricting local autonomy only where necessary for global robustness has led to a scalable Internet. Unfortunately, this scalability and capacity for dist...
Angelos D. Keromytis, Sotiris Ioannidis, Michael B...