Sciweavers

10263 search results - page 1998 / 2053
» From Use Cases to System Operation Specifications
Sort
View
ICSE
2005
IEEE-ACM
14 years 8 months ago
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...
DIM
2009
ACM
14 years 3 months ago
Privacy-aware identity management for client-side mashup applications
This paper concerns the problem of identity management in modern Web-2.0-based mashup applications. Identity management supports convenient access to information when mashups are ...
Saman Zarandioon, Danfeng Yao, Vinod Ganapathy
HIPEAC
2007
Springer
14 years 2 months ago
Compiler-Assisted Memory Encryption for Embedded Processors
A critical component in the design of secure processors is memory encryption which provides protection for the privacy of code and data stored in off-chip memory. The overhead of ...
Vijay Nagarajan, Rajiv Gupta, Arvind Krishnaswamy
HT
2003
ACM
14 years 2 months ago
"Physical hypermedia": organising collections of mixed physical and digital material
This paper addresses the problem of organizing material in mixed digital and physical environments. It presents empirical examples of how people use collectional artefacts and org...
Kaj Grønbæk, Jannie Friis Kristensen,...
SC
2003
ACM
14 years 2 months ago
Fast Parallel Non-Contiguous File Access
Many applications of parallel I/O perform non-contiguous file accesses: instead of accessing a single (large) block of data in a file, a number of (smaller) blocks of data scatt...
Joachim Worringen, Jesper Larsson Träff, Hube...
« Prev « First page 1998 / 2053 Last » Next »