Sciweavers

3712 search results - page 610 / 743
» Role-Based Access Control
Sort
View
AVI
2008
14 years 14 days ago
TapTap and MagStick: improving one-handed target acquisition on small touch-screens
We present the design and evaluation of TapTap and MagStick, two thumb interaction techniques for target acquisition on mobile devices with small touch-screens. These two techniqu...
Anne Roudaut, Stéphane Huot, Eric Lecolinet
NSDI
2007
14 years 14 days ago
TightLip: Keeping Applications from Spilling the Beans
Access control misconfigurations are widespread and can result in damaging breaches of confidentiality. This paper presents TightLip, a privacy management system that helps user...
Aydan R. Yumerefendi, Benjamin Mickle, Landon P. C...
USENIX
2008
14 years 14 days ago
A Compacting Real-Time Memory Management System
We propose a real real-time memory management system called Compact-fit that offers both time and space predictability. Compact-fit is a compacting memory management system for al...
Silviu S. Craciunas, Christoph M. Kirsch, Hannes P...
ANTSW
2008
Springer
14 years 5 days ago
Formal Modeling of BeeAdHoc: A Bio-inspired Mobile Ad Hoc Network Routing Protocol
Design and development of routing protocols for Mobile Ad Hoc Networks (MANETs) is an active area of research. The standard practice among researchers working in this emerging doma...
Muhammad Saleem, Syed Ali Khayam, Muddassar Farooq
CCS
2008
ACM
14 years 4 days ago
CMV: automatic verification of complete mediation for java virtual machines
Runtime monitoring systems play an important role in system security, and verification efforts that ensure that these systems satisfy certain desirable security properties are gro...
A. Prasad Sistla, V. N. Venkatakrishnan, Michelle ...