Sciweavers

52 search results - page 2 / 11
» A general methodology for context-aware data access
Sort
View
CODASPY
2012
12 years 20 days ago
Comparison-based encryption for fine-grained access control in clouds
Access control is one of the most important security mechanisms in cloud computing. However, there has been little work that explores various comparison-based constraints for regu...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu, H...
CHI
2009
ACM
13 years 9 months ago
Hyperlinking reality via camera phones
Mobile vision services are a type of mobile ITS applications that emerge with increased miniaturization of sensor and computing devices, such as in camera equipped mobile phones, ...
Dusan Omercevic, Ales Leonardis
EUROSEC
2008
ACM
13 years 6 months ago
A methodology for the repeatable forensic analysis of encrypted drives
In this paper we propose a sound methodology to perform the forensic analysis of hard disks protected with whole-disk encryption software, supposing to be in possession of the app...
Cory Altheide, Claudio Merloni, Stefano Zanero
ITC
2003
IEEE
176views Hardware» more  ITC 2003»
13 years 10 months ago
Instruction Based BIST for Board/System Level Test of External Memories and Internconnects
ct This paper describes a general technique to test external memory/caches and memory interconnects using on-chip logic. Such a test methodology is expected to significantly reduc...
Olivier Caty, Ismet Bayraktaroglu, Amitava Majumda...
WWW
2006
ACM
14 years 5 months ago
Semantic web integration of cultural heritage sources
In this paper, we describe research into the use of ontologies to integrate access to cultural heritage and photographic archives. The use of the CIDOC CRM and CRM Core ontologies...
Patrick A. S. Sinclair, Paul H. Lewis, Kirk Martin...