Sciweavers

3712 search results - page 187 / 743
» Role-Based Access Control
Sort
View
IASTEDSE
2004
15 years 3 months ago
Conflict checking of separation of duty constraints in RBAC - implementation experiences
Separation of duty constraints define mutual exclusion relations between two entities (e.g. two permissions). Thus, a software component that supports the definition of separation...
Mark Strembeck
DATE
2008
IEEE
77views Hardware» more  DATE 2008»
15 years 9 months ago
Re-Examining the Use of Network-on-Chip as Test Access Mechanism
Existing work on testing NoC-based systems advocates to reuse the on-chip network itself as test access mechanism (TAM) to transport test data to/from embedded cores. While this m...
Feng Yuan, Lin Huang, Qiang Xu
98
Voted
IPPS
2006
IEEE
15 years 8 months ago
Dedicated module access in dynamically reconfigurable systems
Modern FPGAs, such as the Xilinx Virtex-II Series, offer the feature of partial and dynamic reconfiguration, allowing to load various hardware configurations (i.e., HW modules) du...
Jens Hagemeyer, Boris Kettelhoit, Mario Porrmann
131
Voted
VLDB
1993
ACM
73views Database» more  VLDB 1993»
15 years 6 months ago
A Model of Methods Access Authorization in Object-oriented Databases
Object-oriented databases are a recent and important development and many studies of them have been performed. These consider aspects such as data modeling, query languages, perfo...
Nurit Gal-Oz, Ehud Gudes, Eduardo B. Fernán...
131
Voted
TWC
2010
14 years 9 months ago
Delay-Minimal Transmission for Average Power Constrained Multi-Access Communications
We investigate the problem of minimizing the overall transmission delay of packets in a multi-access wireless communication system, where the transmitters have average power constr...
Jing Yang, Sennur Ulukus