Sciweavers

849 search results - page 77 / 170
» Secure Applications of Low-Entropy Keys
Sort
View
TCS
2010
13 years 8 months ago
Arrows for secure information flow
This paper presents an embedded security sublanguage for enforcing informationflow policies in the standard Haskell programming language. The sublanguage provides useful informat...
Peng Li, Steve Zdancewic
USS
2008
14 years 12 days ago
NetAuth: Supporting User-Based Network Services
In User-Based Network Services (UBNS), the process servicing requests from user U runs under U's ID. This enables (operating system) access controls to tailor service authori...
Manigandan Radhakrishnan, Jon A. Solworth
GRID
2006
Springer
13 years 10 months ago
Shibboleth-based Access to and Usage of Grid Resources
Security underpins Grids and e-Research. Without a robust, reliable and simple Grid security infrastructure combined with commonly accepted security practices, large portions of th...
Richard O. Sinnott, Jipu Jiang, J. P. Watt, Oluwaf...
ICRA
2005
IEEE
170views Robotics» more  ICRA 2005»
14 years 3 months ago
Bilateral Teleoperation of Multiple Cooperative Robots over Delayed Communication Networks: Application
Abstract— In a companion paper [1], we propose a control framework for the bilateral teleoperation between a single master robot and multiple cooperative slave robots over delaye...
Dongjun Lee, Oscar Martinez-Palafox, Mark W. Spong
DBSEC
1996
125views Database» more  DBSEC 1996»
13 years 11 months ago
A Framework for High Assurance Security of Distributed Objects
High assurance security is di cult to achieve in distributed computer systems and databases because of their complexity, non-determinism and inherent heterogeneity. The practical ...
John Hale, Jody Threet, Sujeet Shenoi