Sciweavers

192 search results - page 9 / 39
» The Architecture of a Privacy-Aware Access Control Decision ...
Sort
View
AI
2000
Springer
13 years 8 months ago
BIG: An agent for resource-bounded information gathering and decision making
The World Wide Web has become an invaluable information resource but the explosion of available information has made web search a time consuming and complex process. The large num...
Victor R. Lesser, Bryan Horling, Frank Klassner, A...
MICRO
2006
IEEE
191views Hardware» more  MICRO 2006»
13 years 8 months ago
CAPSULE: Hardware-Assisted Parallel Execution of Component-Based Programs
Since processor performance scalability will now mostly be achieved through thread-level parallelism, there is a strong incentive to parallelize a broad range of applications, inc...
Pierre Palatin, Yves Lhuillier, Olivier Temam
SIGCOMM
2010
ACM
13 years 8 months ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long
WPES
2005
ACM
14 years 2 months ago
Anonymous yet accountable access control
This paper introduces a novel approach for augmenting attributebased access control systems in a way that allows them to offer fully anonymous access to resources while at the sam...
Michael Backes, Jan Camenisch, Dieter Sommer
ICSE
1999
IEEE-ACM
14 years 25 days ago
Avoiding Packaging Mismatch with Flexible Packaging
To integrate a software component into a system, it must interact properly with the system's other components. Unfortunately,the decisions about how a component is to interac...
Robert DeLine