Sciweavers

708 search results - page 71 / 142
» Implementing access control to people location information
Sort
View
SIGUCCS
2003
ACM
14 years 1 months ago
Using a course management system to create a training course for student employees
The User Services unit of Information Technologies at the University of Delaware operates nine public computing facilities and employs about 150 students who work as assistants in...
Cindy Guerrazzi, Kate Webster
IEEEARES
2006
IEEE
14 years 1 months ago
Secure 3G User Authentication in Adhoc Serving Networks
The convergence of cellular and IP technologies has pushed the integration of 3G and WLAN networks to the forefront. Gaining secure access to 3G services from 802.11 WLANs is a pr...
Arjan Durresi, Lyn Evans, Vamsi Paruchuri, Leonard...
ACSAC
2001
IEEE
13 years 11 months ago
Genoa TIE, Advanced Boundary Controller Experiment
This document describes experimentation performed as part of the Genoa Technology Integration Experiment (TIE). Achieved in two phases, the overarching assertion of the Genoa TIE ...
Eric Monteith
CCS
2005
ACM
14 years 1 months ago
Automatic placement of authorization hooks in the linux security modules framework
We present a technique for automatic placement of authorization hooks, and apply it to the Linux security modules (LSM) framework. LSM is a generic framework which allows diverse ...
Vinod Ganapathy, Trent Jaeger, Somesh Jha
MICRO
2000
IEEE
176views Hardware» more  MICRO 2000»
13 years 7 months ago
An Advanced Optimizer for the IA-64 Architecture
level of abstraction, compared with the program representation for scalar optimizations. For example, loop unrolling and loop unrolland-jam transformations exploit the large regist...
Rakesh Krishnaiyer, Dattatraya Kulkarni, Daniel M....