Sciweavers

2726 search results - page 429 / 546
» Application security support in the operating system kernel
Sort
View
131
Voted
WPES
2005
ACM
15 years 10 months ago
Anonymous yet accountable access control
This paper introduces a novel approach for augmenting attributebased access control systems in a way that allows them to offer fully anonymous access to resources while at the sam...
Michael Backes, Jan Camenisch, Dieter Sommer
CASES
2008
ACM
15 years 7 months ago
Active control and digital rights management of integrated circuit IP cores
We introduce the first approach that can actively control multiple hardware intellectual property (IP) cores used in an integrated circuit (IC). The IP rights owner(s) can remotel...
Yousra Alkabani, Farinaz Koushanfar
160
Voted
DGO
2009
175views Education» more  DGO 2009»
15 years 6 months ago
Modelling task delegation for human-centric eGovernment workflows
The execution of cross-domain eGovernment applications is a challenging topic. eGovernment organisations are facilitated and conducted using workflow management systems. Workflows...
Khaled Gaaloul, François Charoy, Andreas Sc...
MM
2006
ACM
93views Multimedia» more  MM 2006»
15 years 11 months ago
Scaling laws and tradeoffs in peer-to-peer live multimedia streaming
It is well-known that live multimedia streaming applications operate more efficiently when organized in peer-to-peer (P2P) topologies, since peer upload capacities are utilized t...
Tara Small, Ben Liang, Baochun Li
CLUSTER
2002
IEEE
15 years 4 months ago
PHOENIX: A Self Adaptable Monitoring Platform for Cluster Management
Distributed systems based on cluster of workstation are more and more difficult to manage due to the increasing number of processors involved, and the complexity of associated appl...
Céline Boutrous-Saab, Xavier Bonnaire, Bert...