Sciweavers

705 search results - page 128 / 141
» Security Policy Coordination for Heterogeneous Information S...
Sort
View
MOBISYS
2008
ACM
14 years 8 months ago
Trustworthy and personalized computing on public kiosks
Many people desire ubiquitous access to their personal computing environments. We present a system in which a user leverages a personal mobile device to establish trust in a publi...
Scott Garriss, Ramón Cáceres, Stefan...
SAC
2005
ACM
14 years 2 months ago
An attribute-based access matrix model
In traditional access control models like MAC, DAC, and RBAC, authorization decisions are determined according to identities of subjects and objects, which are authenticated by a ...
Xinwen Zhang, Yingjiu Li, Divya Nalla
CASES
2008
ACM
13 years 10 months ago
Active control and digital rights management of integrated circuit IP cores
We introduce the first approach that can actively control multiple hardware intellectual property (IP) cores used in an integrated circuit (IC). The IP rights owner(s) can remotel...
Yousra Alkabani, Farinaz Koushanfar
ICEIS
2003
IEEE
14 years 1 months ago
Toxic Farm: A Cooperative Management Platform for Virtual Teams and Enterprises
: The proliferation of the Internet has revolutionized the way people work together for business. People located at remote places can collaborate across organizational and national...
Hala Skaf-Molli, Pascal Molli, Gérald Oster...
COMAD
2009
13 years 9 months ago
When to Trigger Active Rules?
Active rules model and enforce enterprise requirements such as situation monitoring using events, conditions and actions. These rules are termed active rules as they make the unde...
Raman Adaikkalavan, Sharma Chakravarthy