Sciweavers

409 search results - page 2 / 82
» Flexible Scheduler-Independent Security
Sort
View
DLOG
2011
12 years 8 months ago
Correcting Access Restrictions to a Consequence More Flexibly
Recent research has shown that labeling ontologies can be useful for restricting the access to some of the axioms and their implicit consequences. However, the labeling of the axio...
Eldora, Martin Knechtel, Rafael Peñaloza
FCS
2008
13 years 6 months ago
Autonomous Scheduling
Abstract. Autonomous scheduling deals with the problem - how to enable agents to schedule a set of interdependent tasks in such a way that whatever schedule they choose for their t...
Chetan Yadati, Cees Witteveen, Yingqian Zhang, Men...
ISI
2006
Springer
13 years 4 months ago
A Flexible and Scalable Access Control for Ubiquitous Computing Environments
Hung Le Xuan, Nguyen Ngoc Diep, Yonil Zhung, Sungy...
CCS
2007
ACM
13 years 11 months ago
A flexible security architecture to support third-party applications on mobile devices
The problem of supporting the secure execution of potentially malicious third-party applications has received a considerable amount of attention in the past decade. In this paper ...
Lieven Desmet, Wouter Joosen, Fabio Massacci, Kats...