Sciweavers

155 search results - page 25 / 31
» Flexible Aliasing with Protection
Sort
View
JCS
2008
88views more  JCS 2008»
13 years 7 months ago
A privacy-aware access control system
The protection of privacy is an increasing concern in our networked society because of the growing amount of personal information that is being collected by a number of commercial...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
13 years 7 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks
ETT
2000
103views Education» more  ETT 2000»
13 years 7 months ago
Dynamic Rate Shaping on MPEG-2 Video Streams for Bandwidth Saving on a Faded Satellite Channel
In a previous work, we studied how to send a video stream over a noisy satellite channel using the scalability features of the MPEG-2 standard. The base and the enhancement flows w...
Nedo Celandroni, Erina Ferro, Francesco Potorti, A...
GRID
2008
Springer
13 years 7 months ago
A Secure Grid Medical Data Manager Interfaced to the gLite Middleware
The medical community is producing and manipulating a tremendous volume of digital data for which computerized archiving, processing and analysis is needed. Grid infrastructures ar...
Johan Montagnat, Ákos Frohner, Daniel Jouve...
DMS
2010
146views Multimedia» more  DMS 2010»
13 years 6 months ago
Electronic Payment and Online Gaming
We will evaluate electronic payment (ePayment) systems by employing a use-value analysis. The key success factors of ePayment systems are security and flexibility. Not surprisingly...
Gerald Draxler, Johannes Sametinger, Andreas Wiesa...