Sciweavers

137 search results - page 25 / 28
» Verifiable Attribute Based Encryption
Sort
View
SEC
2008
13 years 8 months ago
Role Signatures for Access Control in Open Distributed Systems
Implementing access control efficiently and effectively in an open and distributed system is a challenging problem. One reason for this is that users requesting access to remote re...
Jason Crampton, Hoon Wei Lim
JTRES
2010
ACM
13 years 7 months ago
The design of SafeJML, a specification language for SCJ with support for WCET specification
Safety-Critical Java (SCJ) is a dialect of Java that allows programmers to implement safety-critical systems, such as software to control airplanes, medical devices, and nuclear p...
Ghaith Haddad, Faraz Hussain, Gary T. Leavens
JHSN
2006
267views more  JHSN 2006»
13 years 7 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
DBKDA
2010
IEEE
144views Database» more  DBKDA 2010»
13 years 5 months ago
Analysis of the Quality of Life after an Endoscopic Thoracic Sympathectomy: A Business Intelligence Approach
— Primary hyperhidrosis, a disorder characterized by an excessive sweating, has been treated by endoscopic thoracic sympathectomy. As a consequence of the surgery, patients impro...
Diana Goncalves, Maribel Yasmina Santos, Jorge Cru...
ACIVS
2009
Springer
13 years 4 months ago
Concealed Object Perception and Recognition Using a Photometric Stereo Strategy
Abstract. Following a review of current hidden objects detection techniques in a range of security applications, a strategy based on an innovative, low-cost photometric stereo tech...
Jiuai Sun, Melvyn L. Smith, Abdul R. Farooq, Lyndo...