Sciweavers

5252 search results - page 886 / 1051
» Logic in Access Control
Sort
View
ICCD
1993
IEEE
90views Hardware» more  ICCD 1993»
15 years 8 months ago
Subterranean: A 600 Mbit/Sec Cryptographic VLSI Chip
In this paper the design of a high-speed cryptographic coprocessor is presented. This coprocessor is named Subterranean and can be used for both cryptographic pseudorandom sequenc...
Luc J. M. Claesen, Joan Daemen, Mark Genoe, G. Pee...
LCN
1994
IEEE
15 years 8 months ago
The Packet Starvation Effect in CSMA/CD LANs and a Solution
In this paper we explore the packet starvation effect (PSE) that occurs in Ethernet controllers due to the unfairness of the CSMA/CD algorithm. The PSE causes some packets to expe...
Brian Whetten, Stephen Steinberg, Domenico Ferrari
ESORICS
1994
Springer
15 years 8 months ago
On the Expressive Power of the Unary Transformation Model
The Transformation Model TRM was recently introduced 10 in the literature by Sandhu and Ganta. TRM is based on the concept of transformation of rights. The propagation of access ri...
Ravi S. Sandhu, Srinivas Ganta
IFIP
1993
Springer
15 years 8 months ago
Customization and Evolution of Process Models in EPOS
EPOS is a kernel software engineering environment, o ering integrated software con guration and process management. The EPOS process modeling PM support system runs on top of th...
Reidar Conradi, Maria Letizia Jaccheri
PODC
1994
ACM
15 years 8 months ago
A Checkpoint Protocol for an Entry Consistent Shared Memory System
Workstation clusters are becoming an interesting alternative to dedicated multiprocessors. In this environment, the probability of a failure, during an application's executio...
Nuno Neves, Miguel Castro, Paulo Guedes