Sciweavers

155 search results - page 12 / 31
» Flexible Aliasing with Protection
Sort
View
MM
2003
ACM
132views Multimedia» more  MM 2003»
14 years 28 days ago
A flexible and scalable authentication scheme for JPEG2000 image codestreams
JPEG2000 is an emerging standard for still image compression and is becoming the solution of choice for many digital imaging fields and applications. An important aspect of JPEG2...
Cheng Peng, Robert H. Deng, Yongdong Wu, Weizhong ...
SACMAT
2003
ACM
14 years 28 days ago
PBDM: a flexible delegation model in RBAC
Role-based access control (RBAC) is recognized as an efficient access control model for large organizations. Most organizations have some business rules related to access control...
Xinwen Zhang, Sejong Oh, Ravi S. Sandhu
SOSP
1997
ACM
13 years 9 months ago
Application Performance and Flexibility on Exokernel Systems
The exokernel operating system architecture safely gives untrusted software efficient control over hardware and software resources by separating management from protection. This ...
M. Frans Kaashoek, Dawson R. Engler, Gregory R. Ga...
ICRA
2010
IEEE
144views Robotics» more  ICRA 2010»
13 years 6 months ago
Torque and workspace analysis for flexible tendon driven mechanisms
— Tendon driven mechanisms have been considered in robotic design for several decades. They provide lightweight end effectors with high dynamics. Using remote actuators it is pos...
Maxime Chalon, Thomas Wimböck, Gerd Hirzinger
VLDB
2006
ACM
138views Database» more  VLDB 2006»
14 years 8 months ago
Succinct representation of flexible and privacy-preserving access rights
Abstract We explore the problem of portable and flexible privacy preserving access rights that permit access to a large collection of digital goods. Privacy-preserving access contr...
Marina Blanton, Mikhail J. Atallah