Sciweavers

731 search results - page 104 / 147
» Special Section on Information and Communication System Secu...
Sort
View
IFIP
2005
Springer
14 years 2 months ago
Type-Based Distributed Access Control vs. Untyped Attackers
This paper considers the effect of untyped attackers inside a distributed system where security is enforced by the type system. In previous work we introduced the Key-Based Decentr...
Tom Chothia, Dominic Duggan
IV
2002
IEEE
141views Visualization» more  IV 2002»
14 years 1 months ago
Cooperative Robot Teleoperation through Virtual Reality Interfaces
Robots are employed to do exacting routines, ranging from the common place to the difficult and from the relatively safe to the highly dangerous. Remote-controlled robots -or tele...
Alexandre Monferrer, David Bonyuet
SACMAT
2006
ACM
14 years 2 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
AGENTS
1999
Springer
14 years 1 months ago
Exception Handling in Agent Systems
A critical challenge to creating effective agent-based systems is allowing them to operate effectively when the operating environment is complex, dynamic, and error-prone. In this...
Mark Klein, Chrysanthos Dellarocas
TON
2012
11 years 11 months ago
Opportunistic Spectrum Access in Multiple-Primary-User Environments Under the Packet Collision Constraint
—Cognitive Radio (CR) technology has great potential to alleviate spectrum scarcity in wireless communications. It allows secondary users (SUs) to opportunistically access spectr...
Eric Jung, Xin Liu