Sciweavers

184 search results - page 24 / 37
» Dynamic Access Control in a Concurrent Object Calculus
Sort
View
FASE
2008
Springer
13 years 10 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
ICRA
2000
IEEE
108views Robotics» more  ICRA 2000»
14 years 29 days ago
Controllability of Single Input Rolling Manipulation
This paper investigates controllability of underactuated rolling systems consisting of a smooth object rolling on a moving smooth surface. Our system consists of a spherical ball ...
Prasun Choudhury, Kevin M. Lynch
IMECS
2007
13 years 10 months ago
Multi-Application Authentication Based on Multi-Agent System
— This paper proposes an authentication approach to support multi-clients in using a multi-application based environment. The approach is primarily based on the public key infras...
Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Jun...
SIGCOMM
2005
ACM
14 years 2 months ago
Idle sense: an optimal access method for high throughput and fairness in rate diverse wireless LANs
We consider wireless LANs such as IEEE 802.11 operating in the unlicensed radio spectrum. While their nominal bit rates have increased considerably, the MAC layer remains practica...
Martin Heusse, Franck Rousseau, Romaric Guillier, ...
ESORICS
2007
Springer
14 years 2 months ago
Obligations and Their Interaction with Programs
Obligations are pervasive in modern systems, often linked to access control decisions. We present a very general model of obligations as objects with state, and discuss its interac...
Daniel J. Dougherty, Kathi Fisler, Shriram Krishna...