Sciweavers

151 search results - page 12 / 31
» Flexible Alias Protection
Sort
View
SACMAT
2003
ACM
14 years 28 days ago
PBDM: a flexible delegation model in RBAC
Role-based access control (RBAC) is recognized as an efficient access control model for large organizations. Most organizations have some business rules related to access control...
Xinwen Zhang, Sejong Oh, Ravi S. Sandhu
SOSP
1997
ACM
13 years 9 months ago
Application Performance and Flexibility on Exokernel Systems
The exokernel operating system architecture safely gives untrusted software efficient control over hardware and software resources by separating management from protection. This ...
M. Frans Kaashoek, Dawson R. Engler, Gregory R. Ga...
ICRA
2010
IEEE
144views Robotics» more  ICRA 2010»
13 years 6 months ago
Torque and workspace analysis for flexible tendon driven mechanisms
— Tendon driven mechanisms have been considered in robotic design for several decades. They provide lightweight end effectors with high dynamics. Using remote actuators it is pos...
Maxime Chalon, Thomas Wimböck, Gerd Hirzinger
INFOCOM
2012
IEEE
11 years 10 months ago
MobiShare: Flexible privacy-preserving location sharing in mobile online social networks
—Location sharing is a fundamental component of mobile online social networks (mOSNs), which also raises significant privacy concerns. The mOSNs collect a large amount of locati...
Wei Wei, Fengyuan Xu, Qun Li
VLDB
2006
ACM
138views Database» more  VLDB 2006»
14 years 8 months ago
Succinct representation of flexible and privacy-preserving access rights
Abstract We explore the problem of portable and flexible privacy preserving access rights that permit access to a large collection of digital goods. Privacy-preserving access contr...
Marina Blanton, Mikhail J. Atallah