Sciweavers

804 search results - page 50 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
NA
2011
301views Computer Vision» more  NA 2011»
14 years 11 months ago
Automatic grid control in adaptive BVP solvers
Grid adaptation in two-point boundary value problems is usually based on mapping a uniform auxiliary grid to the desired nonuniform grid. Here we combine this approach with a new ...
Gernot Pulverer, Gustaf Söderlind, Ewa Weinm&...
FGCN
2008
IEEE
196views Communications» more  FGCN 2008»
15 years 11 months ago
SS-RBAC: Secure Query Processing Model for Semantic Sensor Networks
This paper proposes a novel secure query processing model for semantic sensor networks. A semantic sensor network (SSN) is a sensor network which includes semantics of sensory dat...
Dongwon Jeong, Hyejin Jeong, Young-Sik Jeong
MOBICOM
1997
ACM
15 years 8 months ago
A Protection Scheme for Mobile Agents on Java
: This paper describes a protection scheme for mobile agents implemented on a Java environment. In this scheme, access to objects is controlled by means of software capabilities th...
Daniel Hagimont, Leila Ismail
APSEC
2005
IEEE
15 years 10 months ago
Model Checking Interrupt-Dependent Software
Embedded control programs are hard to analyse because their behaviour depends on how they interact with hardware devices. In particular, embedded code typically uses interrupts to...
Colin J. Fidge, Phil Cook
CSSE
2004
IEEE
15 years 4 months ago
AdOrBAC: an administration model for Or-BAC
Even though the final objective of an access control model is to provide a framework to decide if actions performed by subjects on objects are permitted or not, it is not convenie...
Frédéric Cuppens, Alexandre Mi&egrav...