Sciweavers

270 search results - page 35 / 54
» Idea: Efficient Evaluation of Access Control Constraints
Sort
View
HICSS
1994
IEEE
149views Biometrics» more  HICSS 1994»
13 years 11 months ago
Stochastic Problem Solving by Local Computation Based on Self-Organization Paradigm
We are developing a new problem-solving methodology based on a self-organization paradigm. To realize our future goal of self-organizing computational systems, we have to study co...
Yasusi Kanada, Masao Hirokawa
EUC
2008
Springer
13 years 9 months ago
Privacy Engine for Context-Aware Enterprise Application Services
Satisfying the varied privacy preferences of individuals, while exposing context data to authorized applications and individuals, remains a major challenge for context-aware compu...
Marion Blount, John Davis, Maria Ebling, William F...
DAC
2005
ACM
14 years 8 months ago
Structural search for RTL with predicate learning
We present an efficient search strategy for satisfiability checking on circuits represented at the register-transfer-level (RTL). We use the RTL circuit structure by extending con...
Ganapathy Parthasarathy, Madhu K. Iyer, Kwang-Ting...
TVLSI
2008
144views more  TVLSI 2008»
13 years 7 months ago
Reconfigurable Hardware for High-Security/ High-Performance Embedded Systems: The SAFES Perspective
Abstract--Embedded systems present significant security challenges due to their limited resources and power constraints. This paper focuses on the issues of building secure embedde...
Guy Gogniat, Tilman Wolf, Wayne P. Burleson, Jean-...
ICSE
2007
IEEE-ACM
14 years 7 months ago
Managing Impacts of Security Protocol Changes in Service-Oriented Applications
We present a software tool and a framework for security protocol change management. While we focus on trust negotiation protocols in this paper, many of the ideas are generally ap...
Halvard Skogsrud, Boualem Benatallah, Fabio Casati...