Sciweavers

427 search results - page 40 / 86
» Policies: Giving Users Control over Calls
Sort
View
ACSAC
1997
IEEE
14 years 2 months ago
A Reference Model for Firewall Technology
This paper concentrates on one particular aspect of providing communication security: rewalls between domains of trust. We argue that signaling support for providing scalable secu...
Christoph L. Schuba, Eugene H. Spafford
CANS
2010
Springer
150views Cryptology» more  CANS 2010»
13 years 8 months ago
Predicate Encryption with Partial Public Keys
Abstract. Predicate encryption is a new powerful cryptographic primitive which allows for fine-grained access control for encrypted data: the owner of the secret key can release pa...
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
CSFW
1992
IEEE
14 years 2 months ago
Secure Dependencies with Dynamic Level Assignments
Most security models explicitly (or implicitly) include the tranquillity principle which prohibits changing the security level of a given piece of information. Yet in practical sy...
Pierre Bieber, Frédéric Cuppens
OSDI
1996
ACM
13 years 11 months ago
CPU Inheritance Scheduling
Traditional processor scheduling mechanisms in operating systems are fairly rigid, often supportingonly one fixed scheduling policy, or, at most, a few "scheduling classes&qu...
Bryan Ford, Sai Susarla
IJRR
2011
98views more  IJRR 2011»
13 years 4 months ago
Real-time photorealistic virtualized reality interface for remote mobile robot control
The task of teleoperating a robot over a wireless video link is known to be very difficult. Teleoperation becomes even more difficult when the robot is surrounded by dense obstac...
Alonzo Kelly, Nicholas Chan, Herman Herman, Daniel...