Sciweavers

1000 search results - page 77 / 200
» Application Access Control at Network Level
Sort
View
DATE
2006
IEEE
110views Hardware» more  DATE 2006»
15 years 9 months ago
Configurable multiprocessor platform with RTOS for distributed execution of UML 2.0 designed applications
This paper presents the design and full prototype implementation of a configurable multiprocessor platform that supports distributed execution of applications described in UML 2.0...
Tero Arpinen, Petri Kukkala, Erno Salminen, Marko ...
129
Voted
USENIX
2007
15 years 5 months ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...
CHI
2005
ACM
16 years 3 months ago
Who gets to know what when: configuring privacy permissions in an awareness application
We report on a study (N=36) of user preferences for balancing awareness with privacy. Participants defined permissions for sharing of location, availability, calendar information ...
Sameer Patil, Jennifer Lai
ICN
2009
Springer
15 years 26 days ago
Simulation Platform for Wireless Sensor Networks Based on Impulse Radio Ultra Wide Band
Impulse Radio Ultra Wide Band (IR-UWB) is a promising technology to address Wireless Sensor Network (WSN) constraints. However, existing network simulation tools do not provide a ...
Abdoulaye Berthe, Aubin Lecointre, Daniela Dragomi...
APNOMS
2006
Springer
15 years 6 months ago
A Novel Rekey Management Scheme in Digital Broadcasting Network
Conditional Access System (CAS) performs entitlement management to make only legitimate subscribers watch pay-services. Generally, CAS uses passive entitlement management to fulfil...
Han-Seung Koo, Il-Kyoo Lee, Jae-Myung Kim, Sung-Wo...