Sciweavers

852 search results - page 123 / 171
» Model-Checking Access Control Policies
Sort
View
CCS
2010
ACM
13 years 9 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
WSC
1998
13 years 10 months ago
Parallel Simulation for Aviation Applications
The Detailed Policy Assessment Tool (DPAT) is a widely used simulation of air traffic control that incorporates advanced technology for user-friendly operation. DPAT computes cong...
Frederick Wieland
MM
2004
ACM
106views Multimedia» more  MM 2004»
14 years 2 months ago
SMARXO: towards secured multimedia applications by adopting RBAC, XML and object-relational database
In this paper, a framework named SMARXO is proposed to address the security issues in multimedia applications by adopting RBAC (Role-Based Access Control), XML, and ObjectRelation...
Shu-Ching Chen, Mei-Ling Shyu, Na Zhao
TGC
2005
Springer
14 years 2 months ago
Types for Security in a Mobile World
Our society is increasingly moving towards richer forms of information exchange where mobility of processes and devices plays a prominent role. This tendency has prompted the acade...
Adriana B. Compagnoni, Elsa L. Gunter
NOSSDAV
2005
Springer
14 years 2 months ago
Interactive media server with media synchronized RAID storage system
We propose an efficient placement algorithm and per-disk prefetching method to effectively support interactive operations in the media server. Our placement policy is incorporate...
Seung Ho Lim, Yo-Won Jeong, Kyu Ho Park