Sciweavers

374 search results - page 47 / 75
» Managing Delegation in Access Control Models
Sort
View
CCS
2007
ACM
14 years 1 months ago
Alpaca: extensible authorization for distributed services
Traditional Public Key Infrastructures (PKI) have not lived up to their promise because there are too many ways to define PKIs, too many cryptographic primitives to build them wi...
Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, ...
CCS
2000
ACM
13 years 11 months ago
Security enhanced mobile agents
This paper describes a security model for mobile agent based systems. The model defines the notion of a security-enhanced agent and outlines security management components in agen...
Vijay Varadharajan
ESOP
2003
Springer
14 years 18 days ago
Using Controller-Synthesis Techniques to Build Property-Enforcing Layers
In complex systems, like robot plants, applications are built on top of a set of components, or devices. Each of them has particular individual constraints, and there are also log...
Karine Altisen, Aurélie Clodic, Florence Ma...
RTSS
2006
IEEE
14 years 1 months ago
System-Level Energy Management for Periodic Real-Time Tasks
In this paper, we consider the system-wide energy management problem for a set of periodic real-time tasks running on a DVS-enabled processor. Our solution uses a generalized powe...
Hakan Aydin, Vinay Devadas, Dakai Zhu
MLMI
2004
Springer
14 years 22 days ago
An Integrated Framework for the Management of Video Collection
Video document retrieval is now an active part of the domain of multimedia retrieval. However, unlike for other media, the management of a collection of video documents adds the pr...
Nicolas Moënne-Loccoz, Bruno Janvier, St&eacu...