Sciweavers

1059 search results - page 10 / 212
» Time-triggered implementations of dynamic controllers
Sort
View
ESORICS
2007
Springer
14 years 4 months ago
Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control
Abstract. From a security standpoint, it is preferable to implement least privilege network security policies in which only the bare minimum of TCP/UDP ports on internal hosts are ...
Paul Z. Kolano
ICDCIT
2004
Springer
14 years 3 months ago
Automatic Enforcement of Access Control Policies Among Dynamic Coalitions
The need to securely share information on an ad-hoc basis between collaborating entities is increasingly becoming important. We propose a coalition based access control model (CBAC...
Vijayalakshmi Atluri, Janice Warner
ERSA
2009
91views Hardware» more  ERSA 2009»
13 years 7 months ago
Configuration with Self-Configured Datapath: A High Speed Configuration Method for Dynamically Reconfigurable Processors
Configuration with Self-configured Data Path (CSDP) is a high speed configuration data loading method for Dynamically Reconfigurable Processors (DRPs). By using a prepared configu...
Toru Sano, Yoshiki Saito, Hideharu Amano
ICDIM
2010
IEEE
13 years 7 months ago
Risk management in dynamic role based access control systems
We present a risk management framework which allows to reason about and manage risk for role based access control systems. The framework expresses essential characteristics of risk...
Ji Ma, Kamel Adi, Luigi Logrippo, Serge Mankovski
CDC
2008
IEEE
124views Control Systems» more  CDC 2008»
14 years 4 months ago
Flight control of a rotary wing UAV - a practical approach
Abstract— This paper presents a novel application of the twotime scale controller for the full envelop flight control of a Rotary wing Unmanned Aerial Vehicle (RUAV). In this pa...
Bilal Ahmed, Hemanshu Roy Pota, Matthew Garratt