Sciweavers

807 search results - page 125 / 162
» Term Rewriting for Access Control
Sort
View
CCS
2008
ACM
15 years 5 months ago
CMV: automatic verification of complete mediation for java virtual machines
Runtime monitoring systems play an important role in system security, and verification efforts that ensure that these systems satisfy certain desirable security properties are gro...
A. Prasad Sistla, V. N. Venkatakrishnan, Michelle ...
121
Voted
CCS
2008
ACM
15 years 5 months ago
A class of probabilistic models for role engineering
Role Engineering is a security-critical task for systems using role-based access control (RBAC). Different role-mining approaches have been proposed that attempt to automatically ...
Mario Frank, David A. Basin, Joachim M. Buhmann
105
Voted
CCS
2008
ACM
15 years 5 months ago
Reconsidering physical key secrecy: teleduplication via optical decoding
The access control provided by a physical lock is based on the assumption that the information content of the corresponding key is private -- that duplication should require eithe...
Benjamin Laxton, Kai Wang, Stefan Savage
119
Voted
AINA
2005
IEEE
15 years 5 months ago
Round-Robin with FCFS Preemption: A Simple MAC Scheduling Scheme for Bluetooth Piconet
— Bluetooth is a short-range TDD (Time Division Duplex) wireless network that supports both circuit- and packetoriented applications. A piconet is composed of a device configure...
Li-Hsing Yen, Chi-Hung Liao
IMC
2007
ACM
15 years 4 months ago
Studying wireless routing link metric dynamics
Multi-hop wireless mesh networks are increasingly being deployed for last-mile Internet access. Typically, network algorithms such as routing, channel assignment and topology cont...
Saumitra M. Das, Himabindu Pucha, Konstantina Papa...