Sciweavers

183 search results - page 18 / 37
» Safety analysis of usage control authorization models
Sort
View
ICNSC
2007
IEEE
14 years 2 months ago
Analysis of a Simple Feedback Scheme for Error Correction over a Lossy Network
Abstract— In time varying packet-switched networks, delivering data with high reliability using a limited amount of network resources is highly desirable. To capture the trade-of...
Oscar Flardh, Carlo Fischione, Karl Henrik Johanss...
GECCO
2006
Springer
185views Optimization» more  GECCO 2006»
14 years 8 days ago
Memory analysis and significance test for agent behaviours
Many agent problems in a grid world have a restricted sensory information and motor actions. The environmental conditions need dynamic processing of internal memory. In this paper...
DaeEun Kim
CSREASAM
2006
13 years 10 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
ACSAC
2002
IEEE
14 years 1 months ago
Access Control for Active Spaces
Active Spaces are physical spaces augmented with heterogeneous computing and communication devices along with supporting software infrastructure. This integration facilitates coll...
Geetanjali Sampemane, Prasad Naldurg, Roy H. Campb...
ECOOP
2005
Springer
14 years 2 months ago
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection
In Java 2 and Microsoft .NET Common Language Runtime (CLR), trusted code has often been programmed to perform accessrestricted operations not explicitly requested by its untrusted ...
Marco Pistoia, Robert J. Flynn, Larry Koved, Vugra...