Sciweavers

95 search results - page 7 / 19
» Risk assessment in distributed authorization
Sort
View
SP
1999
IEEE
145views Security Privacy» more  SP 1999»
13 years 11 months ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo
ICPP
2008
IEEE
14 years 1 months ago
On the Design of Fast Pseudo-Random Number Generators for the Cell Broadband Engine and an Application to Risk Analysis
Numerical simulations in computational physics, biology, and finance, often require the use of high quality and efficient parallel random number generators. We design and optimi...
David A. Bader, Aparna Chandramowlishwaran, Virat ...
WSC
2007
13 years 9 months ago
Clinic: correlated inputs in an automotive paint shop fire risk simulation
General Motors (GM) has developed a first proof-ofconcept simulation model to explore impacts of various fire events in automotive paint shop operations. The approach uses a chron...
Debra A. Elkins, A. Christine LaFleur, Earnest Fos...
CORR
2006
Springer
99views Education» more  CORR 2006»
13 years 7 months ago
Statistical mechanics of neocortical interactions: Portfolio of Physiological Indicators
There are several kinds of non-invasive imaging methods that are used to collect data from the brain, e.g., EEG, MEG, PET, SPECT, fMRI, etc. It is difficult to get resolution of i...
Lester Ingber
IPPS
2007
IEEE
14 years 1 months ago
Integrated Risk Analysis for a Commercial Computing Service
Utility computing has been anticipated to be the next generation of computing usage. Users have the freedom to easily switch to any commercial computing service to complete jobs w...
Chee Shin Yeo, Rajkumar Buyya