Sciweavers

3712 search results - page 551 / 743
» Role-Based Access Control
Sort
View
147
Voted
ICAC
2009
IEEE
15 years 9 months ago
Out-of-band detection of boot-sequence termination events
The popularization of both virtualization and CDP technologies mean that we can now watch disk accesses of systems from entities which are not controlled by the OS. This is a rich...
Naama Parush, Dan Pelleg, Muli Ben-Yehuda, Paula T...
ICASSP
2009
IEEE
15 years 9 months ago
Geometric distortion signatures for printer identification
We present a forensic technique for analyzing a printed image in order to trace the originating printer. Our method, which is applicable for commonly used electrophotographic (EP)...
Orhan Bulan, Junwen Mao, Gaurav Sharma
ICASSP
2009
IEEE
15 years 9 months ago
Time-varying Opportunistic Protocol for maximizing sensor networks lifetime
We consider transmission scheduling by medium access control (MAC) protocols for energy limited wireless sensor networks (WSN) in order to maximize the network lifetime. Time-vary...
Kobi Cohen, Amir Leshem
123
Voted
ICC
2009
IEEE
152views Communications» more  ICC 2009»
15 years 9 months ago
On Concurrent Multipath Transfer in SCTP-Based Handover Scenarios
Abstract—Handling mobility at the transport layer is a promising approach to achieve seamless handover in the context of heterogeneous wireless access networks. In particular, fe...
Lukasz Budzisz, Ramon Ferrús, Ferran Casade...
128
Voted
SP
2009
IEEE
155views Security Privacy» more  SP 2009»
15 years 9 months ago
A Logic of Secure Systems and its Application to Trusted Computing
We present a logic for reasoning about properties of secure systems. The logic is built around a concurrent programming language with constructs for modeling machines with shared ...
Anupam Datta, Jason Franklin, Deepak Garg, Dilsun ...