Sciweavers

393 search results - page 28 / 79
» Security Architectures for Controlled Digital Information Di...
Sort
View
SACMAT
2010
ACM
13 years 5 months ago
Enforcing spatial constraints for mobile RBAC systems
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
Michael S. Kirkpatrick, Elisa Bertino
CHI
1998
ACM
13 years 11 months ago
A Multiple Device Approach for Supporting Whiteboard-Based Interactions
In this paper, we propose a multiple-device approach for supporting informal meetings using a digital whiteboard. Traditional digital whiteboard systems often suffer from a limite...
Jun Rekimoto
SASO
2007
IEEE
14 years 1 months ago
e-SAFE: An Extensible, Secure and Fault Tolerant Storage System
With the rapidly falling price of hardware, and increasingly available bandwidth, the storage technology is seeing a paradigm shift from centralized and managed mode to distribute...
Sandip Agarwala, Arnab Paul, Umakishore Ramachandr...
IMCS
2007
77views more  IMCS 2007»
13 years 7 months ago
Incident response requirements for distributed security information management systems
Purpose – Security information management systems (SIMs) have been providing a unified distributed platform for the efficient management of security information produced by co...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...
DAC
2005
ACM
14 years 8 months ago
Simulation models for side-channel information leaks
Small, embedded integrated circuits (ICs) such as smart cards are vulnerable to so-called side-channel attacks (SCAs). The attacker can gain information by monitoring the power co...
Kris Tiri, Ingrid Verbauwhede