Sciweavers

482 search results - page 94 / 97
» Secure Access Control Scheme of RFID System Application
Sort
View
ECOOP
1993
Springer
14 years 1 months ago
A Language Framework for Multi-Object Coordination
Abstract. We have developed language support for the expression of multiobject coordination. In our language, coordination patterns can be speci ed abstractly, independent of the p...
Svend Frølund, Gul Agha
RTSS
2005
IEEE
14 years 3 months ago
Multi-Granularity Resource Reservations
Resource reservation has been recently supported by many real-time operating systems to provide applications with guaranteed and timely access to system resources. Typically, rese...
Saowanee Saewong, Ragunathan Rajkumar
ASIACRYPT
2005
Springer
14 years 3 months ago
Spreading Alerts Quietly and the Subgroup Escape Problem
We introduce a new cryptographic primitive called the blind coupon mechanism (BCM). In effect, the BCM is an authenticated bit commitment scheme, which is AND-homomorphic. It has n...
James Aspnes, Zoë Diamadi, Kristian Gjø...
CCS
2006
ACM
14 years 1 months ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...
LCTRTS
2007
Springer
14 years 3 months ago
Compiler-managed partitioned data caches for low power
Set-associative caches are traditionally managed using hardwarebased lookup and replacement schemes that have high energy overheads. Ideally, the caching strategy should be tailor...
Rajiv A. Ravindran, Michael L. Chu, Scott A. Mahlk...