Sciweavers

434 search results - page 44 / 87
» The Case for Browser Provenance
Sort
View
IEEEARES
2010
IEEE
14 years 3 months ago
Solving the Transitive Access Problem for the Services Oriented Architecture
: © Solving the Transitive Access Problem for the Services Oriented Architecture Alan H. Karp, Jun Li HP Laboratories HPL-2008-204R1 SOA, web services, access control, RBAC, PBAC,...
Alan H. Karp, Jun Li
EUROSEC
2009
ACM
14 years 3 months ago
Deep packet anonymization
Network traces of Internet attacks are among the most valuable resources for network analysts and security researchers. However, organizations and researchers are usually reluctan...
Michalis Foukarakis, Demetres Antoniades, Michalis...
FOSSACS
2009
Springer
14 years 3 months ago
Bisimulation for Demonic Schedulers
Bisimulation between processes has been proven a successful method for formalizing security properties. We argue that in certain cases, a scheduler that has full information on the...
Konstantinos Chatzikokolakis, Gethin Norman, David...
ICASSP
2009
IEEE
14 years 3 months ago
DOA estimation of quasi-stationary signals via Khatri-Rao subspace
This paper addresses the problem of direction-of-arrival (DOA) estimation of quasi-stationary signals, which finds applications in array processing of speech and audio. By studyi...
Wing-Kin Ma, Tsung-Han Hsieh, Chong-Yung Chi
INFOCOM
2007
IEEE
14 years 3 months ago
Algorithmic Aspects of Access Networks Design in B3G/4G Cellular Networks
— The forthcoming 4G cellular systems will provide broadband wireless access to a variety of advanced data and voice services. In order to do that, these networks will have a sig...
David Amzallag, Joseph Naor, Danny Raz