Sciweavers

811 search results - page 92 / 163
» Modeling and Virtualization for Secure Computing Environment...
Sort
View
IJNSEC
2010
145views more  IJNSEC 2010»
13 years 3 months ago
Formal Specification of Common Criteria Based Access Control Policy Model
One of the major threats that an enterprise Information system networks are facing today is the Insider threat. As part of the Insider Threat study, lack of an effective access co...
Manpreet Singh, Manjeet S. Patterh
AFRIGRAPH
2001
ACM
14 years 15 days ago
Realistic visualisation of the Pompeii frescoes
Three dimensional computer reconstruction provides us with a means of visualising past environments, allowing us a glimpse of the past that might otherwise be difficult to appreci...
Kate Devlin, Alan Chalmers
ACSW
2007
13 years 10 months ago
A Grid Based e-Research Platform for Clinical Management in the Human Respiratory and Vascular System
A Grid based e-Research platform is being developed for providing a simulation-based virtual reality environment for clinical management and therapy treatment. The development of ...
Sherman Cheung, Xingchen Chu, Shengjin Xu, Rajkuma...
CCS
2009
ACM
14 years 3 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino
ENTCS
2007
110views more  ENTCS 2007»
13 years 8 months ago
A Bayesian Model for Event-based Trust
The application scenarios envisioned for ‘global ubiquitous computing’ have unique requirements that are often incompatible with traditional security paradigms. One alternativ...
Mogens Nielsen, Karl Krukow, Vladimiro Sassone