Sciweavers

1597 search results - page 249 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
SACMAT
2003
ACM
14 years 1 months ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
HICSS
2003
IEEE
140views Biometrics» more  HICSS 2003»
14 years 1 months ago
Token Dispensers for GSS Race Conditions: Locking Things That Don't Exist
A technological challenge that distinguishes group support systems (GSS) from many other technologies is the need to accommodate a variety of race conditions. A race condition occ...
Robert O. Briggs, Tomas P. Gregory
MICRO
2009
IEEE
168views Hardware» more  MICRO 2009»
14 years 2 months ago
Ordering decoupled metadata accesses in multiprocessors
Hardware support for dynamic analysis can minimize the performance overhead of useful applications such as security checks, debugging, and profiling. To eliminate implementation ...
Hari Kannan
CCS
2008
ACM
13 years 9 months ago
Deconstructing new cache designs for thwarting software cache-based side channel attacks
Software cache-based side channel attacks present a serious threat to computer systems. Previously proposed countermeasures were either too costly for practical use or only effect...
Jingfei Kong, Onur Aciiçmez, Jean-Pierre Se...
KDD
2008
ACM
135views Data Mining» more  KDD 2008»
14 years 8 months ago
DiMaC: a disguised missing data cleaning tool
In some applications such as filling in a customer information form on the web, some missing values may not be explicitly represented as such, but instead appear as potentially va...
Ming Hua, Jian Pei