Sciweavers

5252 search results - page 891 / 1051
» Logic in Access Control
Sort
View
ECTEL
2006
Springer
15 years 8 months ago
Towards Community-Driven Development of Educational Materials: The Edukalibre Approach
Abstract. The libre software development model has shown how combining collective intelligence can lead to revolutionary methods that underpin major software advancements. This pap...
Jesús M. González-Barahona, Vania Di...
ETRICS
2006
15 years 8 months ago
A P2P Content Authentication Protocol Based on Byzantine Agreement
One of the main advantages of peer-to-peer (P2P) systems is their capability to offer replicas of the same content at various locations. This allows to access contents even when so...
Esther Palomar, Juan M. Estévez-Tapiador, J...
EUC
2006
Springer
15 years 8 months ago
A Processor Extension for Cycle-Accurate Real-Time Software
Certain hard real-time tasks demand precise timing of events, but the usual software solution of periodic interrupts driving a scheduler only provides precision in the millisecond ...
Nicholas Jun Hao Ip, Stephen A. Edwards
GECCO
2006
Springer
124views Optimization» more  GECCO 2006»
15 years 8 months ago
On evolving buffer overflow attacks using genetic programming
In this work, we employed genetic programming to evolve a "white hat" attacker; that is to say, we evolve variants of an attack with the objective of providing better de...
Hilmi Günes Kayacik, Malcolm I. Heywood, A. N...
ACSAC
2001
IEEE
15 years 8 months ago
A Framework for Multiple Authorization Types in a Healthcare Application System
In most of the current authorization frameworks in application systems, the authorization for a user operation is determined using a static database like ACL entries or system tab...
Ramaswamy Chandramouli