Sciweavers

374 search results - page 48 / 75
» Managing Delegation in Access Control Models
Sort
View
ICDIM
2007
IEEE
14 years 1 months ago
Remote instrument control with CIMA Web services and Web 2.0 technology
—The Common Instrument Middleware Architecture (CIMA) model for Web services based monitoring of remote scientific instruments is being extended and enhanced to provide a capabil...
Douglas du Boulay, Clinton Chee, Kenneth Chiu, Ric...
SP
1996
IEEE
121views Security Privacy» more  SP 1996»
13 years 11 months ago
A Security Policy Model for Clinical Information Systems
The protection of personal health information has become a live issue in a number of countries including the USA, Canada, Britain and Germany. The debate has shown that there is w...
Ross J. Anderson
HICSS
1995
IEEE
109views Biometrics» more  HICSS 1995»
13 years 11 months ago
The architecture of an optimistic CPU: the WarpEngine
The architecture for a shared memory CPU is described. The CPU allows for parallelism down to the level of single instructions and is tolerant of memory latency. All executable in...
John G. Cleary, Murray Pearson, Husam Kinawi
EUROSYS
2008
ACM
14 years 4 months ago
Manageable fine-grained information flow
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Petros Efstathopoulos, Eddie Kohler
ECSCW
2007
13 years 8 months ago
Semi-Synchronous Conflict Detection and Resolution in Asynchronous Software Development
Previous work has found that (a) when software is developed collaboratively, concurrent accesses to related pieces of code are made, and (b) when these accesses are coordinated asy...
Prasun Dewan, Rajesh Hegde