Sciweavers

173 search results - page 24 / 35
» Evaluating Access Control Policies Through Model Checking
Sort
View
ICDCS
2010
IEEE
13 years 11 months ago
ESCUDO: A Fine-Grained Protection Model for Web Browsers
Web applications are no longer simple hyperlinked documents. They have progressively evolved to become highly complex—web pages combine content from several sources (with varyin...
Karthick Jayaraman, Wenliang Du, Balamurugan Rajag...
ANOR
2010
102views more  ANOR 2010»
13 years 7 months ago
Optimal control of dosage decisions in controlled ovarian hyperstimulation
Abstract In the controlled ovary hyperstimulation (COH) cycle of the in vitro fertilization-embryo transfer (IVFET) therapy, the clinicians observe the patients' responses to ...
Miao He, Lei Zhao, Warren B. Powell
ACSAC
2001
IEEE
13 years 11 months ago
Why Information Security is Hard-An Economic Perspective
According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of cryptographic protocols, approved ...
Ross J. Anderson
COLCOM
2009
IEEE
14 years 11 days ago
Building a stateful reference monitor with coloured petri nets
The need for collaboration and information sharing has been recently growing dramatically with the convergence of outsourcing and offshoring, the increasing need to cut costs thro...
Basel Katt, Michael Hafner, Xinwen Zhang
LANC
2009
ACM
178views Education» more  LANC 2009»
14 years 10 days ago
A connection level model for IEEE 802.11 cells
We study a wireless network under the 802.11 random access protocol, supporting multiple physical layer rates. Based on models for the effective packet rates achieved at the MAC ...
Andrés Ferragut, Fernando Paganini