Sciweavers

580 search results - page 10 / 116
» Expressive policy analysis with enhanced system dynamicity
Sort
View
ISDA
2006
IEEE
14 years 1 months ago
Enhancing 3D Face Recognition By Mimics Segmentation
In this paper, we present a novel approach for face recognition and authentication based on dimensional surface matching. While most of existing methods use facial intensity image...
Boulbaba Ben Amor, Mohsen Ardabilian, Liming Chen
ACSAC
1999
IEEE
13 years 11 months ago
Security Policy Coordination for Heterogeneous Information Systems
Coordinating security policies in information enclaves is challenging due to their heterogeneity and autonomy. Administrators must reconcile the semantic diversity of data and sec...
John Hale, Pablo Galiasso, Mauricio Papa, Sujeet S...
TISSEC
2010
142views more  TISSEC 2010»
13 years 2 months ago
A logical specification and analysis for SELinux MLS policy
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...
ICSE
2005
IEEE-ACM
14 years 7 months ago
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...
HPDC
2010
IEEE
13 years 8 months ago
Performance analysis of dynamic workflow scheduling in multicluster grids
Scientists increasingly rely on the execution of workflows in grids to obtain results from complex mixtures of applications. However, the inherently dynamic nature of grid workflo...
Omer Ozan Sonmez, Nezih Yigitbasi, Saeid Abrishami...