Sciweavers

1627 search results - page 195 / 326
» On context in authorization policy
Sort
View
ADBIS
2009
Springer
90views Database» more  ADBIS 2009»
14 years 4 months ago
SQL Triggers Reacting on Time Events: An Extension Proposal
Abstract. Being able to activate triggers at timepoints reached or after time intervals elapsed has been acknowledged by many authors as a valuable functionality of a DBMS. Recentl...
Andreas Behrend, Christian Dorau, Rainer Manthey
ICDCSW
2008
IEEE
14 years 4 months ago
Pairing Devices with Good Quality Output Interfaces
The operation of achieving authenticated key agreement between two human-operated devices over a short range wireless communication channel, such as Bluetooth or WiFi, is known as...
Nitesh Saxena, Jonathan Voris
VR
2008
IEEE
129views Virtual Reality» more  VR 2008»
14 years 4 months ago
Object-Capability Security in Virtual Environments
Access control is an important aspect of shared virtual environments. Resource access may not only depend on prior authorization, but also on context of usage such as distance or ...
Martin Scheffler, Jan P. Springer, Bernd Froehlich
ICC
2007
IEEE
102views Communications» more  ICC 2007»
14 years 4 months ago
Quasi-Cyclic Low-Density Parity-Check Codes in the McEliece Cryptosystem
Abstract—In this paper, a new variant of the McEliece cryptosystem, based on Quasi-Cyclic Low-Density Parity-Check (QCLDPC) codes, is studied. In principle, such codes can substi...
Marco Baldi, Franco Chiaraluce, Roberto Garello, F...
ICCCN
2007
IEEE
14 years 4 months ago
A Novel Signal Reconstruction Algorithm for Perception Based Data Reduction in Haptic Signal Communication
The performance and immersiveness of telepresence and teleaction systems critically depend on the quality of the communication between the operator and the teleoperator. High pack...
Julius Kammerl, Peter Hinterseer, Eckehard G. Stei...