Sciweavers

448 search results - page 62 / 90
» Who is in Control
Sort
View
102
Voted
SP
1989
IEEE
160views Security Privacy» more  SP 1989»
15 years 7 months ago
The Chinese Wall Security Policy
Everyone who has seen the movie Wall Street will have seen a commercial security policy in action. The recent work of Clark and Wilson and the WIPCIS initiative (the Workshop on I...
D. F. C. Brewer, M. J. Nash
121
Voted
ASIAN
2006
Springer
131views Algorithms» more  ASIAN 2006»
15 years 7 months ago
FORM : A Federated Rights Expression Model for Open DRM Frameworks
Abstract. Digital Rights Management frameworks (DRM) aim at protecting and controlling information contents widely distributed on client devices. Using a license, the content provi...
Thierry Sans, Frédéric Cuppens, Nora...
114
Voted
ACSAC
2001
IEEE
15 years 7 months ago
Architecture and Applications for a Distributed Embedded Firewall
The distributed firewall is an important new line of network defense. It provides fine-grained access control to augment the protections afforded by the traditional perimeter fire...
Charles Payne, Tom Markham
129
Voted
ERCIMDL
2000
Springer
98views Education» more  ERCIMDL 2000»
15 years 7 months ago
Personal Data in a Large Digital Library
The RePEc Economics library offers the largest distributed source of freely downloadable scientific research reports in the world. RePEc also contains details about Economics inst...
José Manuel Barrueco Cruz, Markus J. R. Kli...
108
Voted
RT
1995
Springer
15 years 7 months ago
Making Global Illumination User-friendly
Global illumination researchers tend to think in terms of mesh density and sampling frequency, and their software reflects this in its user interface. Advanced rendering systems a...
Gregory J. Ward