Sciweavers

327 search results - page 2 / 66
» Access and Use Control using Externally Controlled Reference...
Sort
View
IACR
2011
130views more  IACR 2011»
12 years 5 months ago
Hiding the Policy in Cryptographic Access Control
Abstract. Recently, cryptographic access control has received a lot of attention, mainly due to the availability of efficient Attribute-Based Encryption (ABE) schemes. ABE allows ...
Sascha Müller, Stefan Katzenbeisser
TFS
2008
100views more  TFS 2008»
13 years 6 months ago
Fully Evolvable Optimal Neurofuzzy Controller Using Adaptive Critic Designs
Abstract--A near-optimal neurofuzzy external controller is designed in this paper for a static compensator (STATCOM) in a multimachine power system. The controller provides an auxi...
Salman Mohagheghi, Ganesh K. Venayagamoorthy, Rona...
ECOOP
1999
Springer
13 years 10 months ago
Providing Fine-grained Access Control for Java Programs
There is considerable interest in programs that can migrate from one host to another and execute. Mobile programs are appealing because they support efficient utilization of networ...
Raju Pandey, Brant Hashii
CCS
2009
ACM
14 years 6 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
COOPIS
2002
IEEE
13 years 11 months ago
Object Security Attributes: Enabling Application-Specific Access Control in Middleware
This paper makes two main contributions towards establishing support for application-specific factors in middleware security mechanisms. First, it develops a simple classification...
Konstantin Beznosov