Sciweavers

451 search results - page 67 / 91
» Constrained Sums of Information Systems
Sort
View
ICISS
2007
Springer
14 years 2 months ago
Towards Automated Privilege Separation
Applications are subject to threat from a number of attack vectors, and limiting their attack surface is vital. By using privilege separation to constrain application access to pro...
Dhananjay Bapat, Kevin R. B. Butler, Patrick Drew ...
IAT
2006
IEEE
14 years 2 months ago
Mobile Agent Architecture Integration for a Wireless Sensor Medical Application
Wireless sensor nodes are used to monitor patient vital signs in a medical application. To ensure proper patient care is provided, real-time patient data must be managed correctly...
John Herbert, John O'Donoghue, Gao Ling, Kai Fei, ...
ACMACE
2005
ACM
14 years 2 months ago
Real-time cinematic camera control for interactive narratives
In conventional, visual narrative media such as film, the placement and movement of the camera can be as important a device as the events of the narrative in conveying story and m...
Dan Amerson, Shaun Kime, R. Michael Young
CASES
2008
ACM
13 years 10 months ago
Multiple sleep mode leakage control for cache peripheral circuits in embedded processors
This paper proposes a combination of circuit and architectural techniques to maximize leakage power reduction in embedded processor on-chip caches. It targets cache peripheral cir...
Houman Homayoun, Mohammad A. Makhzan, Alexander V....
CCS
2008
ACM
13 years 10 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton