Sciweavers

804 search results - page 105 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
169
Voted
CODES
2005
IEEE
15 years 10 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
MHCI
2004
Springer
15 years 10 months ago
A Prototype for Remote Vehicle Diagnostics
Abstract. The field of Remote Vehicle Diagnostics can be described as the remote management of vehicles equipped with electronic control systems. Despite the great potential that i...
Jonas Kuschel, Henrik Fagrell, Carl Johan Andersso...
ICPP
2002
IEEE
15 years 9 months ago
Integrating Trust into Grid Resource Management Systems
Grid computing systems that have been the focus of much research activities in recent years provide a virtual framework for controlled sharing of resources across institutional bo...
Farag Azzedin, Muthucumaru Maheswaran
ESWS
2010
Springer
15 years 9 months ago
Reactive Policies for the Semantic Web
Semantic Web policies are general statements defining the behavior of a system that acts on behalf of real users. These policies have various applications ranging from dynamic age...
Piero A. Bonatti, Philipp Kärger, Daniel Olme...
EUC
2008
Springer
15 years 6 months ago
Privacy Engine for Context-Aware Enterprise Application Services
Satisfying the varied privacy preferences of individuals, while exposing context data to authorized applications and individuals, remains a major challenge for context-aware compu...
Marion Blount, John Davis, Maria Ebling, William F...