Sciweavers

882 search results - page 112 / 177
» On the Negotiation of Access Control Policies
Sort
View
CHI
2010
ACM
14 years 2 months ago
Visual vs. compact: a comparison of privacy policy interfaces
In this paper, we compare the impact of two different privacy policy representations – AudienceView and Expandable Grids – on users modifying privacy policies for a social net...
Heather Richter Lipford, Jason Watson, Michael Whi...
ICPADS
2008
IEEE
14 years 2 months ago
An Efficient Policy System for Body Sensor Networks
Body sensor networks (BSNs) have become a promising technology for healthcare, in which biosensors continuously monitor physiological parameters of a user. Distinct from conventio...
Yanmin Zhu, Sye Loong Keoh, Morris Sloman, Emil Lu...
ESORICS
2000
Springer
13 years 11 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
CDC
2009
IEEE
113views Control Systems» more  CDC 2009»
14 years 20 hour ago
A switched system approach to scheduling of networked control systems with communication constraints
This paper presents a scheduling strategy for a collection of discrete-time networked control systems (NCSs) subjected to communication constraints. Communication constraints under...
Shi-Lu Dai, Hai Lin, Shuzhi Sam Ge
ICIP
2010
IEEE
13 years 5 months ago
GAME-theory-based cross-layer optimization for wireless DS-CDMA visual sensor networks
We propose a game-theory-based cross-layer optimization scheme for wireless Direct Sequence Code Division Multiple Access (DSCDMA) visual sensor networks. The scheme uses the Nash...
Lisimachos P. Kondi, Elizabeth S. Bentley