Sciweavers

409 search results - page 14 / 82
» Flexible Scheduler-Independent Security
Sort
View
ENTCS
2008
83views more  ENTCS 2008»
13 years 8 months ago
Infrastructural Support for Enforcing and Managing Distributed Application-Level Policies
State-of-the-art security mechanisms are often enforced in isolation from each other, which limits the kinds of policies that can be enforced in distributed and heterogeneous sett...
Tom Goovaerts, Bart De Win, Wouter Joosen
CSREASAM
2008
13 years 10 months ago
An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing
Pervasive computing allows data to be collected using sensors and mobile devices. Recent studies, however, show that in emergency and crisis situations conventional access control ...
Danfeng Yao
CHI
2008
ACM
14 years 9 months ago
A user study of policy creation in a flexible access-control system
Significant effort has been invested in developing expressive and flexible access-control languages and systems. However, little has been done to evaluate these systems in practic...
Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder,...
AINA
2007
IEEE
14 years 3 months ago
Flexible and Manageable Delegation of Authority in RBAC
One of the most challenging problems in managing large networks is the complexity of security administration. Role based access control (RBAC) has become the predominant model for...
Tuan-Anh Nguyen, Linying Su, George Inman, David W...
ISCA
2008
IEEE
109views Hardware» more  ISCA 2008»
14 years 3 months ago
Flexible Hardware Acceleration for Instruction-Grain Program Monitoring
Instruction-grain program monitoring tools, which check and analyze executing programs at the granularity of individual instructions, are invaluable for quickly detecting bugs and...
Shimin Chen, Michael Kozuch, Theodoros Strigkos, B...