Sciweavers

1150 search results - page 72 / 230
» Specifying Information-Flow Controls
Sort
View
IHI
2010
160views Healthcare» more  IHI 2010»
13 years 5 months ago
Securing the e-health cloud
Modern information technology is increasingly used in healthcare with the goal to improve and enhance medical services and to reduce costs. In this context, the outsourcing of com...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
PERCOM
2006
ACM
14 years 10 months ago
Criticality Aware Access Control Model for Pervasive Applications
In this paper we present a new framework for specifying access control policies in smart spaces called Criticality-Aware Access Control (CAAC). The main idea is to automatically r...
Sandeep K. S. Gupta, Tridib Mukherjee, Krishna K. ...
SBCCI
2004
ACM
111views VLSI» more  SBCCI 2004»
14 years 3 months ago
A partial reconfigurable architecture for controllers based on Petri nets
Digital Control System in the industry has been used in most of the applications based on expensive Programmable Logical Controllers (PLC). These Systems are, in general, highly c...
Paulo Sérgio B. do Nascimento, Paulo Romero...
ICRA
2003
IEEE
95views Robotics» more  ICRA 2003»
14 years 3 months ago
Bilateral time-scaling for control of task freedoms of a constrained nonholonomic system
— We explore the control of a nonholonomic robot subject to additional constraints on the state variables. In our problem, the user specifies the path of a subset of the state v...
Siddhartha S. Srinivasa, Michael Erdmann, Matthew ...
SACMAT
2010
ACM
14 years 3 months ago
A card requirements language enabling privacy-preserving access control
We address the problem of privacy-preserving access control in distributed systems. Users commonly reveal more personal data than strictly necessary to be granted access to online...
Jan Camenisch, Sebastian Mödersheim, Gregory ...