Sciweavers

379 search results - page 5 / 76
» Processing Logical Access Control Command in Computer System
Sort
View
ICRA
2010
IEEE
116views Robotics» more  ICRA 2010»
13 years 5 months ago
Using logic to handle conflicts between system, component, and infrastructure goals in complex robotic architectures
Abstract-- Complex robots with many interacting components in their control architectures are subject to component failures from which neither the control architecture nor the impl...
Paul W. Schermerhorn, Matthias Scheutz
CCS
2007
ACM
14 years 1 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
WEBI
2004
Springer
14 years 26 days ago
An Access Control Model for Web Services in Business Process
Business process describes a set of services that span enterprise boundaries and are provided by enterprises that see each other as partners. Web services is widely accepted and a...
Peng Liu, Zhong Chen
EUROSYS
2010
ACM
14 years 18 days ago
Policy-based access control for weakly consistent replication
Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be tempora...
Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry
GPCE
2008
Springer
13 years 8 months ago
Property models: from incidental algorithms to reusable components
A user interface, such as a dialog, assists a user in synthesising a set of values, typically parameters for a command object. Code for “command parameter synthesis” is usuall...
Jaakko Järvi, Mat Marcus, Sean Parent, John F...