Sciweavers

152 search results - page 9 / 31
» Flexible Access Control using IPC Redirection
Sort
View
DBSEC
2010
113views Database» more  DBSEC 2010»
13 years 7 months ago
A Logic of Privacy
Abstract. We consider the problem of developing an abstract metamodel of access control in terms of which policies for protecting a principal's private information may be spec...
Steve Barker, Valerio Genovese
CCS
2008
ACM
13 years 9 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
TOCHI
1998
89views more  TOCHI 1998»
13 years 7 months ago
Using Metalevel Techniques in a Flexible Toolkit for CSCW Applications
Ideally, software toolkits for collaborative applications should provide generic, reusable components, applicable in a wide range of circumstances, which software developers can as...
Paul Dourish
CSFW
2004
IEEE
13 years 11 months ago
Cassandra: Flexible Trust Management, Applied to Electronic Health Records
We study the specification of access control policy in large-scale distributed systems. We present Cassandra, a language and system for expressing policy, and the results of a sub...
Moritz Y. Becker, Peter Sewell
ISCA
1998
IEEE
108views Hardware» more  ISCA 1998»
13 years 11 months ago
Pipeline Gating: Speculation Control for Energy Reduction
Branch prediction has enabled microprocessors to increase instruction level parallelism (ILP) by allowing programs to speculatively execute beyond control boundaries. Although spe...
Srilatha Manne, Artur Klauser, Dirk Grunwald