Sciweavers

425 search results - page 36 / 85
» Audit
Sort
View
ICPADS
2005
IEEE
14 years 1 months ago
UNIDES: An Efficient Real-Time System to Detect and Block Unauthorized Internet Access
In the audit process of Internet activities of users in a local area network, one of the most difficult problems is the problem of source authentication i.e. establishing securely...
Yusuf Uzunay, Kemal Bicakci
IFIP
2004
Springer
14 years 1 months ago
Discretionary Overriding of Access Control in the Privilege Calculus
We extend a particular access control framework, the Privilege Calculus, with a possibility to override denied access for increased flexibility in hard to define or unanticipated...
Erik Rissanen, Babak Sadighi Firozabadi, Marek J. ...
SIGUCCS
2003
ACM
14 years 27 days ago
Putting OSX in an open access lab: (or "The Joy of X")
This paper discusses the challenges of putting Apple Macintosh OSX into open access and computer lab environments. Categories and Subject Descriptors K.6.4 [Management of Computin...
David L. R. Houston
FM
2001
Springer
99views Formal Methods» more  FM 2001»
14 years 4 days ago
Transacted Memory for Smart Cards
Transacted Memory offers persistence, undoability and auditing. We present a Java/JML Reference Model of the Transacted Memory system on the basis of our earlier separate Z model...
Pieter H. Hartel, Michael J. Butler, Eduard de Jon...
OFAI
1997
Springer
143views Robotics» more  OFAI 1997»
13 years 11 months ago
Autonomous Virtual Actors Based on Virtual Sensors
In this paper, we present current research developments in the Virtual Life of autonomous synthetic actors. After a brief description of the perception action principles with a fe...
Daniel Thalmann, Hansrudi Noser, Zhiyong Huang