Sciweavers

804 search results - page 45 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
CCGRID
2006
IEEE
15 years 10 months ago
A Shibboleth-Protected Privilege Management Infrastructure for e-Science Education
Simplifying access to and usage of large scale compute resources via the Grid is of critical importance to encourage the uptake of e-Research. Security is one aspect that needs to...
J. P. Watt, Oluwafemi Ajayi, Jipu Jiang, Jos Koets...
EDUTAINMENT
2006
Springer
15 years 8 months ago
Haptic Puppetry for Interactive Games
In interactive computer games and computer animation, intuitively controlling the motion of an articulated character is considered as a difficult task. One of the reasons is that, ...
Sujeong Kim, Xinyu Zhang, Young J. Kim
OTM
2007
Springer
15 years 10 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
ACSAC
2000
IEEE
15 years 8 months ago
Secure Compartmented Data Access over an Untrusted Network using a COTS-based Architecture
In this paper, we present an approach to secure compartmented data access over an untrusted network using a secure network computing architecture. We describe the architecture and...
P. C. Clark, M. C. Meissner, K. O. Vance
GLOBECOM
2007
IEEE
15 years 10 months ago
Voice Service Support in Mobile Ad Hoc Networks
— Mobile ad hoc networks are expected to support voice traffic. The requirement for small delay and jitter of voice traffic poses a significant challenge for medium access con...
Hai Jiang, Ping Wang, H. Vincent Poor, Weihua Zhua...