Sciweavers

5252 search results - page 890 / 1051
» Logic in Access Control
Sort
View
CCS
2004
ACM
15 years 8 months ago
A PIN-entry method resilient against shoulder surfing
Magnetic stripe cards are in common use for electronic payments and cash withdrawal. Reported incidents document that criminals easily pickpocket cards or skim them by swiping the...
Volker Roth, Kai Richter, Rene Freidinger
CSFW
2004
IEEE
15 years 8 months ago
Owned Policies for Information Security
In many systems, items of information have owners associated with them. An owner of an item of information may want the system to enforce a policy that restricts use of that infor...
Hubie Chen, Stephen Chong
CCS
2006
ACM
15 years 8 months ago
TinySeRSync: secure and resilient time synchronization in wireless sensor networks
Accurate and synchronized time is crucial in many sensor network applications due to the need for consistent distributed sensing and coordination. In hostile environments where an...
Kun Sun, Peng Ning, Cliff Wang
DSN
2004
IEEE
15 years 8 months ago
A Decentralized Algorithm for Erasure-Coded Virtual Disks
A Federated Array of Bricks is a scalable distributed storage system composed from inexpensive storage bricks. It achieves high reliability with low cost by using erasure coding a...
Svend Frølund, Arif Merchant, Yasushi Saito...
DEXA
2006
Springer
121views Database» more  DEXA 2006»
15 years 8 months ago
DCF: An Efficient Data Stream Clustering Framework for Streaming Applications
Streaming applications, such as environment monitoring and vehicle location tracking require handling high volumes of continuously arriving data and sudden fluctuations in these vo...
Kyungmin Cho, SungJae Jo, Hyukjae Jang, Su Myeon K...