Sciweavers

3712 search results - page 620 / 743
» Role-Based Access Control
Sort
View
ATAL
2010
Springer
13 years 10 months ago
Bushfire BLOCKS: a modular agent-based simulation
Bushfire BLOCKS is a modular, distributed, agent-based simulation for exploring and informing bushfire response strategies. Separate independent modules capture the fire spread, e...
David Scerri, Ferdinand Gouw, Sarah L. Hickmott, I...
ESORICS
2010
Springer
13 years 10 months ago
Readers Behaving Badly - Reader Revocation in PKI-Based RFID Systems
Abstract. Recent emergence of RFID tags capable of performing public key operations motivates new RFID applications, including electronic travel documents, identification cards and...
Rishab Nithyanand, Gene Tsudik, Ersin Uzun
DBSEC
2009
122views Database» more  DBSEC 2009»
13 years 10 months ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald
HPDC
2010
IEEE
13 years 10 months ago
Efficient querying of distributed provenance stores
Current projects that automate the collection of provenance information use a centralized architecture for managing the resulting metadata - that is, provenance is gathered at rem...
Ashish Gehani, Minyoung Kim, Tanu Malik
GECCO
2008
Springer
123views Optimization» more  GECCO 2008»
13 years 10 months ago
MLS security policy evolution with genetic programming
In the early days a policy was a set of simple rules with a clear intuitive motivation that could be formalised to good effect. However the world is becoming much more complex. S...
Yow Tzu Lim, Pau-Chen Cheng, Pankaj Rohatgi, John ...