Sciweavers

211 search results - page 11 / 43
» Integrity Protection for Revision Control
Sort
View
JUCS
2000
117views more  JUCS 2000»
13 years 8 months ago
The Light Control Case Study: Problem Description
: This document contains a range of needs and requirements concerning the construction of a light control system for a floor of a university building. A description of the building...
Stefan Queins, Gerhard Zimmermann, Martin Becker, ...
GI
2009
Springer
13 years 6 months ago
Control and safety architecture for a modular medical robot
: In this paper a new approach for a control and safety architecture for a modular task adaptable medical robot is described. The concept has been evaluated with the MINARO robot, ...
Alexander Korff, Martin Niggemeyer, Matías ...
TON
2008
95views more  TON 2008»
13 years 8 months ago
Integration of explicit effective-bandwidth-based QoS routing with best-effort routing
This paper presents a methodology for protecting low-priority best-effort (BE) traffic in a network domain that provides both virtual-circuit routing with bandwidth reservation for...
Stephen L. Spitler, Daniel C. Lee
SACMAT
2003
ACM
14 years 1 months ago
Dependencies and separation of duty constraints in GTRBAC
A Generalized Temporal Role Based Access Control (GTRBAC) model that captures an exhaustive set of temporal constraint needs for access control has recently been proposed. GTRBACā...
James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Ber...
INFOSCALE
2007
ACM
13 years 10 months ago
A flexible mandatory access control policy for XML databases
A flexible mandatory access control policy (MAC) for XML databases is presented in this paper. The label type and label access policy can be defined according to the requirements ...
Hong Zhu, Renchao Jin, Kevin Lü