Sciweavers

192 search results - page 17 / 39
» The Architecture of a Privacy-Aware Access Control Decision ...
Sort
View
ESCIENCE
2006
IEEE
14 years 2 months ago
FAME: Adding Multi-Level Authentication to Shibboleth
The paper describes the design of FAME (Flexible Access Middleware Extension) architecture aimed at providing multi-level user authentication service for Shibboleth, which is endo...
Aleksandra Nenadic, Ning Zhang, Jay Chin, Carole A...
MONET
2011
13 years 3 months ago
iDSRT: Integrated Dynamic Soft Real-time Architecture for Critical Infrastructure Data Delivery over WLAN
Critical Infrastructures (CIs) such as the Power Grid play an important role in our lives. Of all important aspects of CIs, real-time data delivery is the most important one becaus...
Hoang Viet Nguyen, Raoul Rivas, Klara Nahrstedt
SACMAT
2009
ACM
14 years 3 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...
ISCAS
2005
IEEE
156views Hardware» more  ISCAS 2005»
14 years 2 months ago
Optimal 2 sub-bank memory architecture for bit plane coder of JPEG2000
—JPEG2000 image compression standard is designed to cater the needs of a large span of applications including numerous consumer products. However, its use is still restricted due...
Amit Kumar Gupta, Saeid Nooshabadi, David S. Taubm...
PDP
2003
IEEE
14 years 1 months ago
A multi-tiered agent-based architecture for a cooperative learning environment
: In this paper the problem of educational resource management in a cooperative learning environment is discussed. A task model was elaborated to determine both functional and leve...
Eduardo Sánchez Vila, Manuel Lama, Ricardo ...