Sciweavers

360 search results - page 14 / 72
» The design of integrating subliminal channel with access con...
Sort
View
IADIS
2003
13 years 9 months ago
Bridging Method for Integration the UPNP Domain and the Legacy SNMP Domain
As the UPnP devices and control points have been widely deployed, users intended to access the legacy internet-enabled devices with the UPnP control point. In this paper, we prese...
Pusik Park, KiTaeg Lim, KwangHo Choi
SACMAT
2005
ACM
14 years 1 months ago
Relevancy based access control of versioned XML documents
Integration of version and access control of XML documents has the benefit of regulating access to rapidly growing archives of XML documents. Versioned XML documents provide us w...
Mizuho Iwaihara, Somchai Chatvichienchai, Chutipor...
SACMAT
2004
ACM
14 years 1 months ago
X-GTRBAC admin: a decentralized administration model for enterprise wide access control
Access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large ...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...
CCS
2007
ACM
14 years 1 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
ICRA
2010
IEEE
180views Robotics» more  ICRA 2010»
13 years 5 months ago
Design, simulation and evaluation of kinematic alternatives for Insertable Robotic Effectors Platforms in Single Port Access Sur
This paper presents the task specifications for designing a novel Insertable Robotic Effectors Platform (IREP) with integrated stereo vision and surgical intervention tools for Sin...
Jienan Ding, Kai Xu 0005, Roger E. Goldman, Peter ...