Sciweavers

54 search results - page 9 / 11
» Towards Secure Spectrum Decision
Sort
View
SOUPS
2010
ACM
13 years 9 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan
SP
1997
IEEE
134views Security Privacy» more  SP 1997»
13 years 10 months ago
A Logical Language for Expressing Authorizations
A major drawback of existing access control systems is that they have all been developed with a specific access control policy in mind. This means that all protection requirement...
Sushil Jajodia, Pierangela Samarati, V. S. Subrahm...
DBSEC
2008
188views Database» more  DBSEC 2008»
13 years 7 months ago
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
With the growing use of wireless networks and mobile devices, we are moving towards an era where spatial and temporal information will be necessary for access control. The use of s...
Manachai Toahchoodee, Indrakshi Ray
SACMAT
2009
ACM
14 years 8 days ago
Ensuring spatio-temporal access control for real-world applications
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anas...
CORR
2011
Springer
178views Education» more  CORR 2011»
12 years 9 months ago
Online Learning: Stochastic and Constrained Adversaries
Learning theory has largely focused on two main learning scenarios. The first is the classical statistical setting where instances are drawn i.i.d. from a fixed distribution and...
Alexander Rakhlin, Karthik Sridharan, Ambuj Tewari